We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

Size: px
Start display at page:

Download "We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors"

Transcription

1 We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists 4, , M Open access books available International authors and editors Downloads Our authors are among the 154 Countries delivered to TOP 1% most cited scientists 12.2% Contributors from top 500 universities Selection of our books indexed in the Book Citation Index in Web of Science Core Collection (BKCI) Interested in publishing with us? Contact book.department@intechopen.com Numbers displayed above are based on latest data collected. For more information visit

2 110 A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability Volker Lohweg 1, Karl Voth 2 and Stefan Glock 3 1,2 Ostwestfalen-Lippe University of Applied Sciences, init - Institute Industrial IT, Lemgo 3 Friedrich-Alexander University of Erlangen-Nuremberg, Institute for Electronics Engineering, Erlangen Germany 1. Introduction Sensor and Information fusion is recently a major topic, not only in traffic management, military, avionics, robotics, image processing, and e. g. medical applications, but becomes more and more important in machine diagnosis and conditioning for complex production machines and process engineering. Several approaches for multi-sensor systems exist in the literature, cf. (Hall & Llinas, 2001); (Bossé et al., 2007). The diagnosis and flaw detection in machines and process plants is a complex task, which is dependent on many effects. In the past decades, autonomous and automatic systems have become ubiquitous in our daily life. As famous examples, one may cite advanced driver-assistance systems in vehicles, quality monitoring in production processes, or semi-autonomous unmanned aircraft systems in military forces. All these systems have the common feature that they (partially) capture the state of the environment and generate fused information based on the data gained. More technically, the analogous environment is captured applying several sources (sensors, experts, etc.). After obtaining these analogous signals and experts information, they are preprocessed and transformed into the digital domain, so that they can be processed on computers. In many cases the information captured from the environment may be imprecise, incomplete or inconsistent. Furthermore, signal sources may be not reliable. Therefore, it is necessary to extend known fusion concepts insofar that they are able to handle and to measure imprecision and reliability. In this chapter we will highlight, to our best knowledge, a new human-centric based fusion framework. Additionally, an application of the fusion method is shown for printing machines in the area of quality inspection and machine conditioning. The goal is the early recognition of errors in machines in order to avoid flaws by combining measuring data from several sensors with expert knowledge for the improvement of quality by using several information sources, integrating expert knowledge and perception, extracting reasonable features, and generating intuitive results.

3 192 Sensor Fusion - Foundation and Applications 2 Will-be-set-by-IN-TECH This chapter investigates context-based anticipatoric multi-sensor fusion (CBAMSF) using evidence-based theories. A new algorithmic concept which considers a sensor s imprecision and process vagueness is presented and compared with other Fuzzy and Evidence based algorithms. In particular, the algorithm is inspired by the human behaviour in group-decision situations. This behaviour enables the algorithm to discount defective sensors. The performance of the novel fusion algorithm is evaluated with reference to real-life applications. In this context, the conditions of an intaglio printing machine (banknote printing machine) are monitored whilst the machine is producing security prints. The sections are organised as follows: After a short introduction aleatoric (statistical) uncertainty versus epistemic (subjective, human-oriented) uncertainty is defined and explained. Furthermore, uncertainty in diagnosis of technical systems is highlighted. Thereafter, the concept of evidence theories is pointed-out in a short review namely: Probability Theory, Belief (Dempster-Shafer) Theory, Fuzzy Set Theory and Possibility Theory. In the next sub-section we describe fusion algorithms which are based on human decision processes (Two-Layer Conflict Solving). From these concepts we derive a possibilistic framework for sensor fusion with reliability strategies. The following sub-section describes and compares a certain application. The succeeding section concludes the chapter and gives an outlook on further research topics. 2. Taxonomy of uncertainty In today s production world we are able to generate a huge amount of data from analogue or digital sensors, PLCs, middleware components, control PCs, and, if necessary, from ERP systems. However, creating reliable knowledge about a machine process is a challenge because it is a known fact that Data = Information = Knowledge. Insofar, a fusion process must create a low amount of data which creates reliable knowledge. Usually the main problems in sensor fusion can be described as follows: Too much data, poor models, bad or too many features, and improperly analysed applications. One major mis-belief is that machine diagnosis can only be handled based on the generated data knowledge about the technical, physical, chemical or other processes are indispensable for modelling a multi-sensor system. 2.1 Knowledge and ignorance Specialists in Engineering and Computer Science world accentuate the value of data, assuming that all necessary information about behaviour of a system, etc. is sufficiently contained in the data. Insofar, it is believed that information is an equivalent for knowledge. Therefore, human beings tend intentionally or unintentionally to sweep aside uncertainty in information or ignorance about a state of affairs of a (technical) system. In this sense, we overestimate the amount of information in data which is usable. Following these explanations, it is straightforward to cite Stephen Hawking: The greatest enemy of knowledge is not ignorance, it is the illusion of knowledge. The human knowledge and ignorance behaviour is described in Fig. 1. Referring to (Ayyub & Klir, 2006), the evolutionary certain knowledge (ECK) about a system or state of affairs can intrinsically not be interfered or camouflaged due to its evolutionary nature of this kind of knowledge. The current state of reliable knowledge (RK) has to be interpreted as trained knowledge under the general condition of provable know-how within well-grounded reliability levels, cf. Eq. (1). The intersection of ECK and RK defines the human knowledge base of certain claims and propositions (CCK). It is assumed that this kind of knowledge withstands any

4 A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability Fig. 1. Human evolutionary and trained knowledge. (Ayyub & Klir, 2006) paradigm change or temporal opinion shifts. It can be formulated as: CCK = ECK RK. (1) Referring to Fig. 1, two types of ignorance can be distinguished: i) ignorance within the RK circle, based on irrelevance, etc.; and ii) ignorance outside RK, based on unknowns, missing know-how, etc. An expert (Expert A in Fig. 1), equipped with some know-how about a system or state of affairs, pictured with ellipses in Fig. 1, can be represented in three ways; 1) equipped with trained, created, or captured knowledge as a subset of ECK; 2) equipped with self-perceived knowledge by the expert; and 3) equipped with perception by others of the expert s knowledge. As (Ayyub & Klir, 2006) pointed out, the ECK of an expert may be smaller than the self-perceived knowledge, and therefore, the difference of the two types can be interpreted as a measure of overconfidence. Furthermore, an ellipse can also extend beyond the RK base as a result of creativity and imagination. The difference between the expert s knowledge and the ignorance space outside CCK can be interpreted as a human intuition process (creative process). It is unquestionable, that other experts will have other individual ellipses which may or may not overlap each other. If the ellipses of two or more experts do not overlap, based on a conjoint topic, a conflict situation may occur. Usually two types of ignorance can be identified: i) blind ignorance with its sub-categories unknowable, irrelevance, and fallacy (camouflage); ii) conscious ignorance with its sub-categories inconsistency (confusion, conflict, inaccuracy) and incompleteness (absence, unknowns, uncertainty). In technical systems the latter ones are of main interest. Inconsistency occurs mainly in the case of inaccurate measurements and conflict-afflicted sensor information. Incompleteness of information, in the sense of uncertainty, causes in most instances problems in system modelling. Uncertainty is defined as intrinsic absence of necessary knowledge. In many cases, as, e. g. in complex systems, it is usually impossible to acquire all necessary information to create certain knowledge. Therefore, major attention should be given to this type of ignorance. As it was stated in (Klir & Wierman, 1998) uncertainty can rarely be avoided, when dealing with real-word problems. At sensory and pre-processing level, uncertainty is an inseparable companion of any measurement, resulting from measurement errors, stochastic effects, such as noise and resolution limits in terms of sampling and quantisation (Lohweg & Mönks, 2010a). At knowledge level (cognitive level), we are conditioned by vagueness and ambiguities in the description of processes or natural languages.

5 194 Sensor Fusion - Foundation and Applications 4 Will-be-set-by-IN-TECH The concept of uncertainty was and is philosophically widely discussed in the community of Bayesian and Probability advocates. Bayesians argue that it is invariably feasible to design a probability model for any on random variables based technical task. This argumentation is questionable in a sense that it does not fulfil a real-world scenario in all cases. Usually at least two kinds of uncertainty species have to be taken into account: i) the aleatoric uncertainty (random effects, signal noise, etc.); and ii) the epistemic uncertainty (lack of knowledge or incomplete knowledge regarding a complex system, etc.), cf. (Hacking, 1975). The latter one is challenging in problem solving, because the unknown knowledge has to be modelled in different ways, other than probability based concepts. This argumentation leads to Shafer (Shafer, 1976), Zadeh (Zadeh, 2008) and others, who stated that the lack of knowledge is precisely reflected by the situation where the probability of events is ill-known or expert s knowledge is necessary. Furthermore, recently Salicone has presented a possibilistic approach to handle measurement uncertainty in electrical engineering applications (Salicone, 2007) Aleatoric uncertainty If data is complete and intrinsically non-deterministic in nature, it can be assumed as random (stochastic). The uncertainty is attributed to real-world phenomena and it can not be reduced or even eliminated by expanding an underlying knowledge base. Probabilistic approaches, such as classical Probability Theory (frequentist) and Bayesian Probability Theory are an effective way to model stochastic uncertainties, like measurement noise, etc., cf. (Ayyub & Klir, 2006). This type of uncertainty is referred to as aleatoric uncertainty (cf. Table 1) Epistemic uncertainty In many situations we lack information, that is, not all intrinsically necessary knowledge is available at state. In this case, the uncertainty range should be reduced by expanding the underlying knowledge base. When data is scarce the probabilistic approach may not be appropriate to reduce the system s uncertainty. Major types of this uncertainty are inconsistent and incomplete data as well as inconsistent information or knowledge. In many cases this uncertainty can be reduced by multi-sensory fusion and expert s knowledge, cf. (Ayyub & Klir, 2006). This type of uncertainty is referred to as epistemic uncertainty (cf. table 1). Aleatoric Uncertainty Epistemic Uncertainty Type irreducible reducible Data random, stochastic scarce Origin intrinsic variations in data inconsistent & incomplete data, lack of knowledge Model Probability Theory Evidence and Fuzzy Theories Table 1. Classification of aleatoric and epistemic uncertainty. 3. Basics on Evidence Theory The Evidence Theory was introduced by Glenn Shafer in the 1970s, summarised and condensed in the book A Mathematical Theory of Evidence in 1976 (Shafer, 1976). He extended the seminal work of Arthur P. Dempster from the 1960s about upper and lower bounds of probability measures (Dempster, 1967). Today many quantitative approaches are available to

6 A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability model uncertainty and knowledge processing in the light of sensor and information fusion. It is an interesting fact that many approaches have a common theoretical base. Fig. 2. Theories embedded in evidence theory. Dempster-Shafer Theory (sometimes called Belief Theory) serves as an interconnection between many quantitative approaches, namely: Probability Theory, Possibility Theory, Fuzzy Theory, and others. The above mentioned theories are (partly) special branches of the Evidence Theory (Dempster-Shafer Theory). Fig. 2 illustrates symbolically the interconnection of different approaches insofar they are needed in this chapter. 3.1 Dempster-Shafer (Belief) Theory Data fusion deals with data which is received from sensors, experts or human linguistic words, etc. Furthermore, much of such knowledge is cognitive and imprecise (incomplete) to some degree. To deal with uncertain knowledge, various strategies based on Dempster-Shafer Theory (DST) (Dempster, 1967), (Shafer, 1976), are researched and applied, because DST is capable of managing uncertainty due to its framework. DST acts as the pioneer in data fusion algorithms, which was proposed by Dempster and extended by Shafer subsequently. Serving as a seminal fusion approach, DST stirs up many discussions and studies in data fusion. DST is a mathematical theory of evidence, which combines independent sources of information (Dempster, 1967), (Shafer, 1976). With combination of evidence sources obtained from sensors (experts), more reliable and convincing fusion results are expected. First a finite frame of discernment, which forms a set Θ, is defined, Θ = {θ 1, θ 2,..., θ n }, with an arbitrary event variable (proposition, hypothesis) θ i, i N. A power set, P(Θ) = 2 Θ, includes all the possible combinations of propositions θ i. Propositions are regarded to be mutually exclusive and exhaustive. Thus, the power set contains 2 n elements. As an example, assume the following: Θ = {A, B} P(Θ)={, A, B, Θ}. A function m :2 Θ [0, 1] is called a mass function, also known as Basic Probability (Belief) Assignment (BPA, BBA) of an event, e. g. A, with m( )=0, A P(Θ) m(a)=1. (2)

7 196 Sensor Fusion - Foundation and Applications 6 Will-be-set-by-IN-TECH If there is no element in the BBA, then its mass is zero. On the other hand, as P(Θ) is a power set composed of all the subsets, the sum of all the masses must be equal to one. Furthermore, the focal element (mass is larger than zero) is defined as: {(A, m(a)) A Θ and m(a) > 0}. (3) A belief function, Bel( ): 2 Θ [0, 1], satisfies the following three axioms (cf. Eq. (4) - Eq. (6)): Axiom 1: Axiom 2: Axiom 3: Bel( )=0. (4) Bel(Θ)=1. (5) Bel(A B) Bel(A)+Bel(B) if A B =. (6) Contrary to the probability theory, the belief measure is super-additive. That is, the belief of the union of two propositions may be larger than the addition of the two belief measures of each proposition A and B. Belief (Bel) and plausibility function (Pl), Pl( ): 2 Θ [0, 1], are essential concepts in DST, which are used in decision-making. Plausibility has to be interpreted as the dual function of the belief. Bel(A)= m(b) and Pl(A)=1 Bel(A c ), (7) B A where A c is the complement of proposition A. In DST, Bel(A) has to be interpreted after Shafer (Shafer, 1976) as a person s (sensor information) degree of belief that the truth lies in A, whereas Pl(A) can be considered as a measure of maximum support for a proposition A under the constraint of disbelief in A. Thus, Bel(A) is the total belief mapped to A; Pl(A) is the total mass assignment, which can move into A, and m(a) is the basic belief assignment, which is exclusively dedicated to A. Furthermore, plausibility can be derived as follows: Pl(A)=1 Bel(A c )=1 m(b)= m(b) m(b)= m(b). (8) B A c B P(Θ) B A c B A = From Eq. (7) the following can be directly derived: Bel(A c )+Pl(A)=1 and Bel(A)+Pl(A c )=1. (9) Bel( ) is, in an early interpretation, called lower bound probability, while Pl( ) is the upper bound probability, for the reason that Bel( ) is the must-be -probability and on the other hand Pl( ) is the might-be -probability. Therefore, Pl( ) includes more mass than Bel( ), which is illustrated with Bel(A) Pl(A). (10) The Ignorance Igr(A) can be interpreted as Igr(A) =Pl(A) Bel(A). (11)

8 A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability After obtaining the above-mentioned concepts, we are able to use DST to fuse independent data sources by applying Dempster s Rule of Combination, cf. (Shafer, 1976). It is also called normalised conjunctive combination rule: n m i (A)=K i=1 A 1... A n =A n i=1 m i (A). (12) The term A1... A n =A n i=1 m i(a) aggregates the consonant opinions (non-conflicting parts) from sensors which are subsequently multiplied with conflicting factor K =(1 k c ) 1, where k c = n A 1... A n = i=k m i (A k ). (13) The variable m i (A k ) denotes the mass of propositions from sensor i. According to the definition of k c it defines the empty intersection of the propositions of all sensors. Therefore, it is also called conflicting coefficient. The DST offers two main advantages: i) belief and possibility model two levels of probability, generating and assigning ignorance (range of uncertainty) or uncertainty to a proposition A, furthermore total uncertainty can be modelled by the vacuous belief, that is, m(θ)=1; ii) as the measures are defined on subsets of P(Θ), non-specificity and conflict can be modelled. In order to demonstrate the concept of DST, let us assume a banknote was given to an expert for forgery analysis. Is it genuine or is it counterfeit? The proposition A corresponds to the possibility that the banknote is genuine, whereas the proposition B reflects the proposition that the banknote is counterfeit; then Θ = {A, B} is the frame of discernment and P(Θ)= {, A, B, Θ} is the corresponding power set. The belief functions Bel(A) and Bel(B) represent the belief measures in genuineness and counterfeit of the banknote. As, in this case, B = A c, Eq. (6) changes to Bel(A A c ) Bel(A)+Bel(A c ) and A A c =, A A c = 1 Bel(A)+Bel(A c ) 1. If the expert assumes the genuineness of the banknote, one would set Bel(A) near to 1 and independently of Bel(A) Bel(A c )toalow value. In case one believes in the opposite, one sets Bel(A c ) to a high value and Bel(A) toa low value. If the expert is uncertain about the decision, but tends to genuineness, one might vote for Bel(A) = 0.5 and Bel(A c )= 0.3, and in the desperate case of total uncertainty (total ignorance), one will set both belief measures to zero. It has to be pointed out that the literature on DST is manifold. For deeper insights we refer to, e. g., (Dempster, 1967), (Shafer, 1976), (Yager, 1987), (Hall & Llinas, 2001), (Ayyub & Klir, 2006), (Campos, 2006), (Yager & Liu, 2008). 3.2 Probability Theory Probability Theory (PT) is the oldest concept for quantifying uncertainty. It is one of the last major mathematical domains to be formed at the end of the seventeenth century. Based on a correspondence between Fermat and Laplace about gambling, Probability Theory is also today an active field of research. PT typically models random phenomena and chance. Although, PT is an old theory, it was put into question in the twentieth century, whether the Probability Theory can only be viewed as a theory of chance. In every day situations it is used in two different ways: i) when randomness is assumed; ii) in cases of lacking knowledge. Therefore, two schools of interpretation can be found: objectivists (frequentists) and subjectivists (Bayesians). Hacking (Hacking, 1975) calls probability a Janus-faced theory. We refer to the philosopher Karl Popper (Popper, 1934) on the one hand and the

9 198 Sensor Fusion - Foundation and Applications 8 Will-be-set-by-IN-TECH subjectivists John Maynard Keynes (Keynes, 1921) as well as to Rudolf Carnap (Carnap, 1947) or Frank P. Ramsey (Ramsey, 1960) on the other hand. The dispute in the community still exists. Based on random experiments, like throwing the dice or tossing a coin, classical probability is defined by the relative frequency of events in the long run. If Θ = {θ 1, θ 2,..., θ n } denotes the so called sample space, the discrete, finite, non-empty set of all possible outcomes, then θ i, i N, are the elementary events (singletons). A non-negative number P(A), P : 2 Θ [0, 1], is assigned to each subset A Θ an event of any collection of outcomes: A = {θ Θ θ A}. This number is called probability of the event A. The axiomatic approach of probability was formulated by Kolmogorov in 1933 (Kolmogorov, 1933). The number P(A) must satisfy the three following axioms; cf. Eq. (14) - Eq. (16): Axiom 1: Axiom 2: Axiom 3: P( )=0. (14) P(Θ)=1. (15) P(A B)=P(A)+P(B) if A B =. (16) The probability measure of two (or more) is additive. This property, defined by axiom 3, is one of the key features in Probability Theory. Once a probability P(A) is set, the complement P(A c ) is fixed. In other words, the event θ Θ can either be true or false. If for each possible outcome θ Θ, the probability p(θ) is given, then a function p : Θ [0, 1] is called probability density. The function p(θ)=p({θ}), θ Θ satisfies the following conditions: 0 p 1, (17) p(θ)=1. (18) θ Θ Following the additivity axiom, the probability of A can be determined by its individual probabilities of each of its elementary events: P(A)= p(θ). (19) θ A Again, we follow the example of genuine or counterfeit banknotes. The proposition A corresponds to the possibility the banknote is genuine, whereas the proposition B reflects the proposition that the banknote is counterfeit; then Θ = {A, B} is the set of events. The probabilities P(A) and P(B) represent the chances in genuineness and counterfeit of the banknote. As, in this case, B = A c, Eq. (16) changes to P(A A c )=P(A)+P(A c ) and A A c =, A A c = 1 P(A)+P(A c )=1. If the expert assumes the genuineness of the banknote, one sets P(A) near to 1 and P(A c )=1 P(A). In case one believes in the opposite, one sets P(A c ) to a high value and P(A)=1 P(A c ). If the expert is uncertain about his decision, the only thing one can do, is to set P(A)=0.5, that is, P(A c )=0.5 (total ignorance). The above mentioned property is essential in Probability Theory. In the subjective view, the Bayesian view, knowledge and uncertainty is represented based on probability measures P( ), where the measure describes a likelihood of the occurrence of an event A. In this context, P( ) is often referred to as a-priori probability which is determined on previous knowledge based on adequate data and taken for granted. The probability

10 A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability of an event A is interpreted in a sense of degree of certainty or degree of belief. Knowledge about the occurrence of an event is either modelled by P(A)=1incase of a certain event or P(A) = 0 for an impossible event. Once an event A is given by a certain probability P(A), the complement P(A c ) is naturally given. Therefore, the only possibility to model uncertainty in a set Θ is, as there is no evidence for a certain event, the probability density p(θ)= 1, θ Θ. The cardinality of the set is Θ. The modelling of uncertainty is a weakness Θ of Probability Theory. As wider the set Θ is, as more improbable is a single event θ i, but this is counter-intuitive, because a certain event will occur to p(θ i )=100 % and not to p(θ i )= 1 Θ. The basis of fusion in PT is well-grounded on the Bayes Rule (Bayes, 1763). Two events A Θ 1 and B Θ 2 are assumed to be conjoint, A B =. That is, that the joint probability can be determined by the joint elements θ in the joint set Θ = Θ 1 Θ 2, defined by the cross product, and is denoted by P(A B). The conditional probability P(A B) is defined as the probability of A being true under the condition of the event B. It is defined as: P(A B)= P(A B), P(B) > 0, P(A) > 0. (20) P(B) The conditional probability is called a-posteriori probability of the event A. That is, that the probability is not only based on the previous knowledge, but also takes into account the evidence of the event B. P(B A)= P(B A) P(A) = P(A B) P(A) = P(A B) P(B). (21) P(A) In Eq. (21) P(A) is usually defined as the total probability, which is defined as P(A)= n P(A B i ) P(B i ). (22) i=1 It has to be pointed out, that B 1,..., B n have to be pairwise exclusive and mutually exhaustive. Furthermore, P(B i ) > 0 i. Now, we show basically how information is fused in the sense of Bayesian inference. Let F i be a measured machine readable feature on a banknote (e. g. a certain coding) which has to be detected by an optical sensor S i as a "true" S i or "false" Si c information. Furthermore, it can be assumed, that the accuracy of the sensors P(S i F i ) may be 0.9, that is, the probability of a correct measurement (the sensor delivers a correct result under the condition of a correct code) is 90 %. Then, the probability of the detection of the feature F i under the condition of the correct sensor information is: P(F i S i )= ( P(Si F i ) ) P(F P(S i ) i ). (23) With Eq. (20) and Eq. (22) the sensor probability P(S i )=P(S i F i )+P(S i Fi c ) can readily be formulated: P(F i S i )= P(S i F i ) P(F i ) P(S i F i )+P(S i Fi c) = P(S i F i ) P(F i ) P(S i F i )P(F i )+P(S i F c i )P(Fc i ). (24) The a-priori probability P(F i ) is given under the assumption, that it is very likely that the correct feature is used in the measurement session (e. g %), that is, P(Fi c )=

11 200 Sensor Fusion - Foundation and Applications 10 Will-be-set-by-IN-TECH Furthermore, as P(S i F i )= 0.9 is assumed, the probability P(S i Fi c )= 0.1, that is, the detection of a feature which is not present. It has to be pointed out, that all four combinations, based on the equivalent a-priori probabilities, have to be determined: P(F i S i ), P(F i Si c) (false positive), P(Fi c S i) (false negative), and P(Fi c Sc i ) to get the full picture. In case of multiple measurements for one feature we get P(F 1 S 1, S 2 ), which can be interpreted, e. g., as two temporarily independent measurements P(S 1, S 2 )=P(S 1 ) P(S 2 ).In this case we obtain: P(F 1 S 1, S 2 )= P(S 1, S 2 F 1 ) P(F 1 ) P(S 1, S 2 ) With Eq. (23) P(F 1 S 1, S 2 ) can be simplified to P(F 1 S 1, S 2 )= = P(S 1 F 1 )P(S 2 F 1 ) P(F 1 ) P(S 1 )P(S 2 ) = P(S 2 F 1 )P(S 1 F 1 ) P(F 1 ). P(S 2 )P(S 1 ) (25) ( ) P(S2 F 1 ) P(F P(S 2 ) 1 S 1 ). (26) The conditional probability P(F 1 S 1 ) from the first measurement is combined with the appropriate probabilities of the second measurement to generate a fused result. The first conditional probability serves as the new a-priori probability for the second measurement. This is how Bayesian inference combines old information with new information to update the belief states. Probability and its frequentist representations concerns random effects. The events in Probability Theory are either assumed to be true or false. The probability of an event is connected directly to the event and to its complement. The Bayesian view leads to modelling of uncertainties. However, Probability Theory has its weakness in the area of epistemic uncertainty because of its additivity axiom. A-priori probabilities are the decisive part in PT. Furthermore, getting these a-priori probabilities is not easy to achieve. Probability Theory is very well adapted to problems based on independent random variables, but in fusion processes this independence is seldom to occur. The limitation of Boolean logic in PT leads to Fuzzy Theory. 3.3 Fuzzy Set Theory As we have noticed, DST and PT are able to describe epistemic and aleatoric uncertainty. However, both theories are based on crisp sets of a frame of discernment. In many measurement or sensor related concepts we have to handle both, noise and systematic effects. The latter ones are assumed to be systematic errors which can possibly be compensated, as they are treated like a known bias or offset. Unfortunately, in complex systems it is nearly impossible to obtain all systematic measurement data. Therefore, in many instances we have to handle these errors as systematic uncertainties. The normal situation is as follows: The systematic input is recognised, but the exact information (data, values) is unknown. However, in most cases it is possible to locate a data value in a closed measurement interval an interval of confidence. A systematic contribution to a measurement always takes the same value, even if unknown, within a certain interval. That is, not each value has the same probability to occur. A certain unknown value will occur to 100 %, others will definitely not occur. However, values in the interval have, in absence of further evidence, the possibility to occur. The above mentioned idea is in contrast to Probability Theory. This fact leads to Fuzzy Set Theory (Fuzzy Theory, FT). The concept of fuzzy sets was first introduced by Zadeh in 1965 (Zadeh, 1965) in order to represent incomplete knowledge.

12 A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability However, in 1937 the mathematician and philosopher Max Black developed the concept of vagueness and fuzzy membership (Black, 1937). The traditional set approach is based on crisp sets. That is, a crisp variable can only take the value 1 or can be interpreted to be true, if the variable belongs to the set, or 0 (false), if it does not belong to the set. Fuzzy sets, in contrast, are not based on a Boolean value representation, but on a membership function, which describes the membership of a variable to its appending fuzzy set in a closed interval [0, 1]. It represents a multi-valued logic. Fuzzy sets can thus be described as a generalisation of crisp sets. This is not an antagonism in respect of PT, but rather an addendum to it, since both theories address a different kind of uncertainty: randomness and vagueness (fuzziness). Let Θ be a frame of discernment, then a fuzzy set A of Θ is defined by a membership function μ A : Θ [0, 1]. The membership function μ A (θ) R is the degree of membership for a fixed element θ in the fuzzy set A, that is, the degree of belonging x = θ and x A, the degree of certainty of the proposition θ A. The normalised membership function of a fuzzy set A satisfies the following axioms; cf. Eq. (27) - Eq. (29): Axiom 1: Axiom 2: Axiom 3: x 0 A : μ A (x 0 )=1. (27) 0 μ A (x) 1. (28) x, x 0 A x = x 0 : μ A (x) 1. (29) If A is a fuzzy set defined by its membership function μ A (x) and B is another fuzzy set defined by μ B (x), then μ A (x) μ B (x), iffa is a subset of B: A B μ A (x) μ B (x). (30) The membership function μ A (x) of a fuzzy variable x can also be described in terms of α-cuts different vertical levels α [0, 1]. Each α-cut is defined as A α = {x A μ A (x) α}. (31) The representation of a fuzzy variable in terms of its α-cuts describes a group of nested sets (consonant sets) A α in terms of intervals of confidence with its associated levels of certainty α (cf. Fig. 3). The level of certainty describes how certain a measurement value is this is the case iff a crisp value is taken into account. The level of confidence is mapped to a set and represents the available knowledge based on an unknown value in the range of the set A α. Under the assumption of a finite support of A, we can assume that a membership function is fully represented by its α-cuts. Furthermore, the α-cuts of each fuzzy variable are closed intervals of real numbers R. The more the level of certainty increases, the more the interval of confidence decreases. This fact is in line with the human knowledge representation: If the level of certainty increases, the level of confidence must decrease. The level of certainty indicates how sure a measurement is, while the level of confidence specifies the probability that a certain value falls in its interval. In other words, as higher α is, as lower the level of confidence must be. The level of confidence is associated to(1 α). The above mentioned fact will be a subject-matter in Possibility Theory. In the framework of fuzzy sets, knowledge is represented by membership functions, which map a measurement value in a sense of a proposition to x = θ A to μ A (x), that is, the belief

13 202 Sensor Fusion - Foundation and Applications 12 Will-be-set-by-IN-TECH Fig. 3. Membership function and α-cut. in the proposition is expressed by μ A (x). This fact corresponds to the concept of vagueness as a value θ may belong to more than one membership function with different degrees of membership (e. g, μ B (θ) < μ A (θ) and A B = ), cf. Fig. 4). Fig. 4. Membership functions μ A (x) and μ B (x) with conjoint subset A B =. Here, set A belongs to μ A (x) and set B belongs to μ B (x). The value x = θ is a member of both sets a value which belongs to the subset A B. As the degree of membership μ A (θ) is higher than the degree of membership μ B (θ), the value θ belongs more certain to set A than to set B. Fuzzy Set Theory can handle vagueness and non-specificity as it is an extension of classical set theory. Total uncertainty (total ignorance) is expressed in terms of a rectangular shaped membership function with μ A (θ i )=1 θ i A. Aggregation of information is based on elementary fuzzy set operations. The set operators aim for combining information in order to generate a single fuzzy variable. The basic operations are the equivalents to the above mentioned operations in classical set theory. Hence, we are able to define the complement, intersection and union of fuzzy variables. Following the base fuzzy set operations defined by Zadeh (Zadeh, 1965) the complement of a normalised membership value of the fuzzy set A is defined as: μ A c(x)=1 μ A (x). (32) The complement μ A c(x) describes the degree to which x does not belong to the fuzzy set A. The fuzzy union μ A B (x), based on a s-norm, s : [0, 1] [0, 1] [0, 1], is defined as: μ A B (x)=max(μ A (x), μ B (x)). (33)

14 A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability Again, contrary to the probability theory, fuzzy union is non-additive. The fuzzy intersection μ A B (x), based on a t-norm, t : [0, 1] [0, 1] [0, 1], is defined as: μ A B (x)=min(μ A (x), μ B (x)). (34) The Eq. (33) and Eq. (34) are based on so-called triangular norms, t-norms and t-conorms (or s-norms). As many operators exist, we refer to the literature (Klir & Yuan, 1995). The union and intersection can be interpreted as aggregation operations. In general, aggregation operations combine several fuzzy sets or membership functions resulting in a single membership function. The aggregation operator, h : [0, 1] n [0, 1], generates the output function by μ agg (x)=h(μ A (x), μ B (x),...). (35) The aggregation operator h is a bounded, monotonic, increasing, symmetric, and idempotent operator (Klir & Yuan, 1995). Beside the fuzzy union and intersection, which can be defined in different ways, the so called averaging operators play an important role in aggregation. A mapping M : [0, 1] [0, 1] [0, 1] is an averaging operation iff it is continuous and satisfies the properties Symmetry: M(x 0, x 1 )= M(x 1, x 0 ); Idempotency: M(x 0, x 0 )= x 0 ; Monotonicity: M(x 0, x 1 ) M(x 2, x 3 ) if x 0 x 2 and x 1 x 3 ; Boundaries: M(0, 0)=0 and M(1, 1)=1; x i [0, 1] (Dujmović & Larsen, 2007). Furthermore, the following inequality is valid for all averaging operators min(μ A (x), μ B (x)) M(μ A (x), μ B (x)) max(μ A (x), μ B (x)). (36) By applying different averaging operators it is possible to construct a more and-like (min) or a more or-like (max) aggregation. Often the following operators are used: Harmonic mean, Geometric mean, and Arithmetic mean which are certain forms of the generalised mean. Another important basic operator covers the full range of Eq. (36). This class of operators is called ordered weighted averaging operators (OWA) (Dujmović, 1974), (Yager, 1988), and (Dujmović & Larsen, 2007). A weighting vector w =(w 0, w 1,..., w N 1 ) with w i [0, 1] with the constraint N 1 w i = 1. (37) i=0 The OWA operator h OWA is defined by first ordering the membership functions μ i (x) in non-increasing order, denoted with index (i), for a given value x = θ, based on their individual fuzzy sets A, B,..., and then applying μ agg ( w, θ)= N 1 w i μ (i) (θ). (38) i=0 OWA aggregation can be freely positioned between the borders of Eq. (36). Dujmović (Dujmović, 1974) introduced a measure (degree of disjunction) that indicates how much an operator is near to the max-operation. Yager (Yager, 1988) called this operator orness. The operator models any degree of orness between 1 (pure OR) and 0 (pure AND) by adjustment of its corresponding parameters, the OWA weights after Eq. (37). orness(h OWA ( w)) = 1 N 1 N 1 i=0 (N i) w i. (39)

15 204 Sensor Fusion - Foundation and Applications 14 Will-be-set-by-IN-TECH Quantifier: All (pure AND) Most of At least afew Atleastone (pure OR) Operator type: t-norms averaging operators t-conorms OWA operators Important operators: algebraic product min arithmetic mean max algebraic sum Stronger(less restrictive) operator direction Fig. 5. Different rules of aggregation, with their associated operators (Larsen, 1999). The andness degree is defined as: andness(h OWA )=1 orness(h OWA ). Fuzzy Set Theory operates with vague and non-specific information, based on a human-centred way of thinking. Usually, knowledge is represented by membership functions and their aggregation. In contrary to PT the propositions are multi-valued. The construction of membership function can be established by different concepts; e. g. cf. (Bocklisch & Priber, 1986), (Klir & Yuan, 1995), (Bossé et al., 2007), (Lohweg & Mönks, 2010a). 3.4 Possibility Theory Possibility Theory (PosT) was introduced in 1978 by Zadeh (Zadeh, 1978). As imprecision and vagueness are rather possibilistic than probabilistic (frequentist s view) in its description (... it is possible that we will have snow in summer, however, it is highly improbable...), it is reasonable to describe the meaning of information, especially the meaning of incomplete information within a possibilistic framework. Possibility Theory reflects Probability Theory insofar, as it is also based on set-functions. Instead of one function, PosT is based on two functions, which are called possibility measure and necessity measure. We will concentrate on numerical possibility theory with its special branches based on consonant (nested) sets (Shafer, 1976) and on membership functions (Zadeh, 1978). It has to be pointed out that PosT has been exhaustively studied by Dubois and Prade; e. g. (Dubois & Prade, 1978; 1983; 2000; 2003). Possibility Theory can be interpreted as a framework for handling incomplete information and aggregate information coming from multiple sources (sensors, experts, databases, etc.). If Θ = {θ 1, θ 2,..., θ n } denotes the so called finite frame of discernment, θ i, i N, then a possibility measure Π is a mapping Π :2 Θ [0, 1], which follows the axioms (cf. Eq. (40) - Eq. (42)): Axiom 1: Axiom 2: Axiom 3: Π( )=0. (40) Π(Θ)=1. (41) Π(A B)=max(Π(A), Π(B)). (42) The measure Π(A) denotes the possibility that an element θ belongs to the crisp set A. Asit can be noted from Eq. (42) the union of two sets is non-additive. The necessity measure N(A) is the dual set-function of Π(A): N(A)=1 Π(A c ). (43) The intersection of two sets (Eq. (44)) is determined as follows: N(A B)=min(N(A), N(B)). (44)

16 A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability Interpreting Eq. (43), the necessity measure describes the fact that N(A) is entirely true, iff the complement of A is impossible. The following implications hold for possibility and necessity measures: N(A) > 0 Π(A)=1, Π(A) < 1 N(A)=0. A fuzzy variable can be interpreted as a representation of an element of a fuzzy set with a graded membership within its set. The membership function can also be interpreted differently: Let μ(θ) be a possibility level for which θ A represents an existing, but unknown element (incomplete information) within in the crisp set A. We describe an unknown element (number, measurement value, etc.) with a certain level of certainty (μ(x) x = θ). In this case the normalised fuzzy set is called possibility distribution π x (θ), where x is a fuzzy variable of Θ, and θ or θ i are appointed values of Θ that x can take. A possibility distribution is a mapping π : Θ [0, 1] with at least one π(θ i )=1, θ i Θ. Possibility and necessity measures are represented by the associated possibility distribution (θ A), that is, Π(A)=max(π x (θ)), (45) N(A)=min(1 π x (θ)). (46) If Θ is infinite, then Π(A)=sup θ A (π x (A)) and N(A)=inf θ A (1 π x (A)). Now, we will give a short insight in the interconnection between PosT and DST in the case that the focal elements within particular sets are nested, that is, the sets are ordered in a way that each is contained in the next one. Belief and Plausibility functions are termed to be consonant (Shafer, 1976). Let Θ be the frame of discernment with its subsets A i = {θ 0, θ 1,..., θ i 1 } for i = 0, 1,..., N 1. The subsets A i match the relationship: Θ A 0 A 1 A 2... A N 1 (47) In the case of nested sets Belief and Plausibility satisfy the following relationship with A, B P(Θ), cf. Eq. (42), Eq. (44): Pl(A B)=max(Pl(A),Pl(B)), Bel(A B)=min(Bel(A), Bel(B)). (48) When Plausibility and Belief functions satisfy Eq. (48), they are called Possibility and Necessity functions. Possibility Theory is defined axiomatically via Eq. (40) - Eq. (42) as an independent theory, though, as a second branch it can be defined by the possibility distribution as a special form of the membership function (Zadeh, 1978). π x (θ)=μ x (θ). (49) However, it has to be pointed out that the membership function may not be readily interpreted as a possibility distribution function, because the meaning of both functions is completely different. Whereas the membership function describes a fuzzy variable θ A, the possibility distribution function characterises a representation of what is known (expert, sensor measurement, etc.) about the value of some quantity θ ranging on A Θ (not necessarily a random quantity). The function π x (θ) reflects the more or less plausible values of the unknown quantity roughly. We tend to another notation proposed by Dubois and Prade to circumvent any ambiguity: π x (θ A)=μ x (A θ). (50)

17 206 Sensor Fusion - Foundation and Applications 16 Will-be-set-by-IN-TECH The possibility that x = θ, knowing that θ A is π x (θ A), whereas μ x (A θ) is the level of possibility for θ A. An interesting interrelationship exists between α-cuts (cf. Eq. (31)), basic belief assignments m, possibility distributions π x (θ A), and membership functions μ x (A θ) iff the sets are nested (cf. Eq. (47)). Let α i be a certain value of μ x (A αi θ), then A αi denotes it corresponding α-cut. The associated possibility function is then defined by (Klir & Yuan, 1995): under the condition, that π x (θ)= N 1 m(a αi ), (51) i=0, θ A αi m(a αi )=α i α i+1 and i = 0, 1,..., N 1, and α N = 0. Furthermore, keeping in mind, the higher α i, the lower the possibility is that an element θ will fall in its associated α-cut, that is, Π(A c α i )=α i. Therefore, with Eq. (43), N(A αi )=1 α i the level of confidence. For details refer to Salicone (Salicone, 2007). Possibility Theory is well suited for sensor and information fusion. Let π A (x) and π B (x) be two possibility distributions from two different signal sources, then, proposed by Dubois and Prade (Dubois & Prade, 1994), the sources are fused by: [ t(π π AB (x)=max A (x), π B (x)) ] 1 k c (π A (x), π B (x)), min[1 k c(π A (x), π B (x)), s(π A (x), π B (x))]. (52) The functions t( ) and s( ) are t-norms and s-norms, where K( ) is the conflicting factor known from Dempster s rule of combination (cf. Eq. (13)). The fusion concept takes into account the reliability of different sources. If both sources are reliable an and-like fusion is applied; otherwise, an or-like fusion is executed. Possibility Theory provides a promising framework for sensor and information fusion based on incomplete or party unknown data. It is able to handle uncertainty, ignorance, and vagueness based on crisp sets instead of fuzzy sets. However, being a distinct theory, its branches interconnect Dempster-Shafer Theory, Fuzzy Set Theory, and Probability Theory. Insofar PosT can be interpreted as an unifying Theory. 4. Human behaviour based sensor fusion Human beings have remarkable potential for reasoning and rational decision-making, even when confronted with such uncertain data. Therefore, it is highly desirable to design technical systems in a way which is inspired by human behaviour. Zadeh called this human level machine intelligence (HLMI), cf. (Zadeh, 2008). Although HLMI has been intensively investigated under the umbrella of artificial intelligence (AI) and its subdivision multi-source data fusion for the past fifty years, it is still a hot research topic (Zadeh, 2008).

18 A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability Two-layer Conflict Solving Fusion Dempster-Shafer based fusion creates counter-intuitive results in high conflict situations. If two sensors, that are measuring the same effect, deliver different information, then a conflict situation occurs. This inherent defect pointed out by Zadeh (Zadeh, 1986), brings criticism to the DST. Therefore, many other alternatives were researched. For instance, we refer to Campos rule (Campos, 2006) and the work of Dezert and Smarandache (DSmT) (Smarandache & Dezert, 2006). No matter whether the original DST rule or other ad-hoc rules are applied, none of them have been regarded as a superior method compared to others. Therefore, a Two-Layer Conflict Solving (TLCS) data fusion approach is suggested, which includes two layers to combine pieces of evidence. The conflict is solved in some degree during combination therefore, it is named as conflict solving. The first layer resolves the conflict in some extent, and the second continues to solve it and achieves more stable results. Psychologically, as clearly stated in (Lipshitz et al., 2001), Decision making has been traditionally studied at three levels: individual, group and organizational., also cf. (Sunita, 1999). This shows that decision is made at three layers, in which conflict is unavoidable to be considered and solved: The individual level is the basic element that holds conflict; group level has a larger range which includes conflict while organisational level is the largest. The latter can be instantiated by connecting several layer 2 outputs via TLCS to generate a higher hierarchical level the organisational one. In such a way, humans believe that conflict can be solved in an straightforward way, although it is impossible to totally eliminate its negative impacts. The approach is also applicable if several groups of sensors are considered in a larger system. Fig. 6 depicts the scheme of TLCS. In Fig. 6, layer 1 is regarded as working at the individual Fig. 6. Two-Layer Conflict Solving System. level because the Conflict-Modified DST (CMDST) is an approach which combines every two sensors data so that a conflict is considered and solved between two individuals. After receiving the results from the previous layer, layer 2 collects all sensors original information and fuses it with the combined results from the CMDST. The conflict is further resolved at a group level Aggregation rules Especially due to the inherent defect residing in the DST (Zadeh, 1986), (Campos, 2006), many other authors have proposed their own data fusion approaches which serve as ad-hoc

19 208 Sensor Fusion - Foundation and Applications 18 Will-be-set-by-IN-TECH alternatives. Just to name only a few, e. g., Murphy s rule (Murphy, 2000) m M = m 1(A)+m 2 (A), (53) 2 is a trade-off rule, which takes the arithmetic average value of two masses m 1 (A) and m 2 (A). Yager s rule (Murphy, 2000) regards that the universal set Θ should include the mass from the conflicting parts, so that the universal set (set with all propositions) is always introduced in Yager s rule: Campos rule m Y (C)= m 1 (A)m 2 (B), (54) A,B 2 Θ,A B=C m Y (Θ)=m 1 (Θ)m 2 (Θ)+ A,B 2 Θ,A B= m 1 (A)m 2 (B). (55) m C (A i )= 1+log 1 DST 1 n A 1.. A n = i=1 m i (A i ), (56) is explained in (Campos, 2006). Dezert-Smarandache Theory (DSmT) is rather a comprehensive theory; we refer to (Smarandache & Dezert, 2006) Conflict-modified DST Based on the idea of DST, CMDST calculates the conflict in a different manner as shown in the formula: k cm = n A 1 A 2 =,A 1 A 3,..., i=k A i A k =,...,An 1 A n = m i (A k ). (57) Within this definition, conflicts are calculated between every two sensors instead of all the sensors together (which is used in DST). This difference can be seen from the condition of summation in Eq. (13), A 1... A n = and A 1 A 2 =, A 1 A 3 =,..., A 1 A n =,..., A n 1 A n =. Due to the specified way of determining conflicts in Eq. (57), this kind of conflict will very likely be larger than one, whereas in DST the denominator is 1 k c. Therefore, the denominator in DST must also be modified. First of all, the denominator is modified as: ( ) n k cm = 2 ( ) n 2 A 1 A 2 =,A 1 A 3 =,..., A1 A n =,...,A n 1 A n = n i=k m i (A k ). (58) The reason for choosing ( n 2 ) = B c(n) (binomial coefficient) is that there are B c (n) possible combinations for calculating conflicts (n is the number of sensors). Thus, K cm (K in DST) is: K cm = B c (n) 1 n A 1 A 2 =,A 1 A 3 =,..., i=k A i A k =,...,An 1 A n = m i (A k ) (59)

20 A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability with 1 B c K cm. The CMDST is formed as: n n CMDST(A)= m i (A)=K cm m i (A). (60) i=1 A 1 A 2 =A,... i=1 A 1 A 3 =A,... A n 1 A n =A Group Conflict Redistribution As pointed out in (Sunita, 1999), decision making is also studied in a group level. Hence, Group Conflict Redistribution (GCR, layer 2 in Fig. 6) acts as group conflict solving strategy, solving a conflict in a larger extent compared to individual level (CMDST). Distinguishing from layer 1 (CMDST), GCR combines sensors propositions in a group manner, which means all sensors will participate in this procedure (Li & Lohweg, 2008): m(a)= m i (A)+(B c (n)+ log(b c (n) k cm ) ) CMDST(A) A 1.. A n =A n+b c (n)+ log(b c (n) k cm ). (61) The variable n defines the number of sensors and log(x) is logarithm to the base 10. The denominator includes the number of sensors and how many combinations B c (n) among sensors are possible as well as conflict evaluation term log(b c (n) k cm ). In the numerator part, sensors original propositions A1.. A n =A m i (A) are calculated with corresponding CMDST results, which are obtained from layer 1. Finally, the sum of final fused results remains 1. Numerical examples on TLCS which describe the aggregation effect can be found in (Li & Lohweg, 2008) Balanced TLCS The intention to optimise the TLCS concept is threefold. Balanced TLCS (BalTLCS) intends to cover three topics: First, the general TLCS approach should be utilised again. Second, the result for two information sources (sensors, cognitive knowledge) should generate intuitive results. Third, the conflict redistribution scheme for data fusion should be adapted and simplified in a way that the fusion process i) should be an additive function of all inputs and ii) could be extended to multiple sources and focal elements (masses). The approach is based on the normalised version of CMDST. The normalisation is based on the Eq. (57) - Eq. (60). The normalised conflicting factor N K cm is defined as follows: N K cm = B c (n) B c (n) k cm + ǫ < (62) where ǫ > 0, n > 1, n N, k cm = 0 L R : L =(1 N K cm ) < ǫ. Therefore, as 0 k cm B c (n), the normalised conflict factor ranges between B c (n) B c (n)+ǫ N K cm B c (n) ǫ 1 <. (63) The non-conflicting part is determined and coupled with the conflicting part according to Eq. (60) as n N CMDST(A)= m i (A)= N n K cm B c (n) m i (A). (64) i=1 A 1 A 2 =A,... i=1 A 1 A 3 =A,... A n 1 A n =A

21 210 Sensor Fusion - Foundation and Applications 20 Will-be-set-by-IN-TECH The BalGCR (Balanced Group Conflict Redistribution) approach combines the sensors propositions in a group manner which implies that in this case all sensors will participate additively in this procedure. The intention is to utilise the inverse of the normalised conflict factor as a control parameter. If no conflict has occurred, mainly the N CMDST fusion result should contribute to the overall result. If the conflict is high, then all different information sources have to be taken into account. None of the information sources is allowed to dominate the other ones, and none of them is allowed to play a part in the overall result with more than n 1. Furthermore, in a strong conflict case it is not intended to shift the information content (hypotheses) to the universal set Θ, defining ambiguity or ignorance, because a conflict has to be solved in any case. As the set must be complete regarding the sources, all information sources (hypotheses) which can appear must be covered in a set. The only situation where hypotheses can be transferred to the universal set Θ occurs when a source delivers no reliable data. Formally BalGCR fusion consists of two parts. The first one describes the non-conflicting part: m nc = N Kcm 1 CMDST(A)= 1 n B c (n) m i (A). (65) A 1 A 2 =A,... i=1 A 1 A 3 =A,... A n 1 A n =A The second part characterises the conflicting part. Eq. (65) tends to zero in heavy conflicts (k cm B c (n)). Therefore, it is proposed here that all masses supporting a certain hypothesis have to be averaged to fulfil the above mentioned statements. Furthermore, the average value has to be controlled, e. g., by the normalised conflicting factor or coefficient. It is proposed to use m c (A)= k cm B c (n) 1 n n m i (A) (66) i=1 for the conflicting part. It can be recognised that, in the case of maximum conflict, the average value of all sensory hypotheses is determined. In the case of minimum conflict m c (A) 0 both parts (Eq. (65) and Eq. (66)) are additively connected. m(a)=m c (A)+m nc (A)= k cm B c (n) 1 n n m i (A)+ 1 B i=1 c (n) n A 1 A 2 =A,... i=1 A 1 A 3 =A,... A n 1 A n =A m i (A). (67) This equation describes the data fusion approach by the balanced TLCS concept. All masses are fused regarding their pro-and-con-hypotheses. Finally, the sum of final fused results remains always 1, if all sensors deliver acceptable results in the sense of an adequately functioning sensor. As the fusion process is based on averaging, the final result is relatively insensitive against noise effects. The fused mass of the universal set is determined for n sensors as follows: m(θ)=1 [m(a)+m(b)+m(c)+...]. (68) The masses take into account all information from the hypotheses. For further details and results we refer to (Li & Lohweg, 2008) and (Lohweg & Mönks, 2010b).

22 A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability Majority-Observation-Guided Possibilistic Fusion One promising mathematical theory that appears to be capable of (partially) modelling a human-like decision process is Possibility Theory. Although Possibility Theory was introduced in 1978 by Zadeh (Zadeh, 1978) and has been primarily advanced by Dubois and Yager over the past few decades (Dubois & Prade, 2000; Yager, 2004), it is still in its infancy. This section is focused on possibilistic multi-sensor systems for industrial automation. With reference to the Sect. 4.1, Dempster-Shafer Theory-based fusion approaches were recently applied to this problem statement and reached satisfactory results (Lohweg & Mönks, 2010b). On the contrary, possibilistic approaches are rarely applied to those industrial-automation processes that can be classified under the problem theme of context-based anticipatoric machine conditioning. As Possibility Theory appears to be crucial for modelling the human behaviour when confronted with vague data (Zadeh, 2008), this section presents a novel possibilistic multi-source data fusion approach, the so-called Majority-Observation-Guided Possibilistic Fusion Rule (MOGPFR). The MOGPFR is capable of handling the imprecision of sensors. Moreover, it has the ability of merging imprecise, incomplete or inconsistent data in a human-like group-decision process. The rest of this section is organised as follows: Section provides the basics needed for the understanding of the framework. Sections introduce the novel possibilistic fusion rule Fusion operators As pointed out in Sect. 3.4, conjunctive aggregation of possibility distributions is debatable when not all sources are completely reliable. In this context, when all sources are completely unreliable, the disjunctive rule is most appropriate. However, when confronted with a group of reliable and unreliable sources the class of averaging operators, which lies between the conjunctive and the disjunctive rule (cf. Fig. 5), might be beneficial. OWA operators consider all fuzzy sets equally important. However, in multi-criteria decision problems, such as data fusion, different criteria, represented by different fuzzy sets, might have different importance. Hence, the effect on the overall outcome of satisfying a criterion should decrease as the importance of satisfying the criterion decreases. To meet this desire, the concept of OWA aggregation is expanded by attaching a so-called importance weight, w i, to each criteria, a i to the importance weighting vector v of a n-dimensional attribute A. This leads to the class of Importance Weighted Ordered Weighted Averaging (IWOWA) operators as defined below: λ IWOWA ( v, w, a)= n w i b (i), (69) i=1 where i is a permutation on {1,..., i,..., n}, such that b (1)... b (i)... b (n) and b i = h α OWA(v i, a i ) (Larsen, 1999). Larsen has shown (Larsen, 1999) that the class of IWOWA operators is order equivalent to the Weighted Arithmetic Mean (WAM) (Yager, 1994). Order-equivalence is sufficient when the operator is applied to provide preference ordering (Larsen, 2002). However, in situations where the aggregated value is used for other purposes, such as multi-source data fusion, a full equivalence to the WAM is needed. This property can be obtained by normalizing Eq. (69) in the interval of λ IWOWA ( v, w,0) and λ IWOWA ( v, w,1), which leads to the class of Implicative Importance Weighted Ordered Weighted Averaging (IIWOWA) operators as defined as follows (Larsen, 2002): λ IIWOWA ( v, w, a)= λ IWOWA( v, w, a) λ IWOWA ( v, w,0) λ IWOWA ( v, w,1) λ IWOWA ( v, w,0). (70)

23 212 Sensor Fusion - Foundation and Applications 22 Will-be-set-by-IN-TECH Possibilistic fusion frameworks Various multi-source data-fusion frameworks based on the Possibility Theory have been proposed in the past thirty years (Yager, 1979; 1994). These frameworks were mainly influenced and developed by Dubois and Yager (Dubois et al., 2001). Therefore, this section introduces the two possibilistic fusion frameworks previously mentioned. Dubois adaptive fusion is grounded on the discussions on the usefulness of the maximum specificity principle. It is based on the supposition that j n sources of a n-dimensional fusion problem are reliable. First, the j reliable sources are combined conjunctively. Secondly, the intermediate result of the combination of the j reliable sources is combined disjunctively with the (n j) unreliable sources. However, in real-life, a precise number of reliable sources is sometimes unknown or is complex to evaluate. For this reason, a good alternative is an optimistic estimation, j o, and a pessimistic estimation, j p, of the number of reliable sources using the following derivation (Dubois et al., 2004): Let T S be a subset of sources, S = {S 1,..., S i,..., S n } be the set of sources to be combined, and h be the consistency index [ ] h(πv(x), 1 πv(x)) 2 = sup min[πv(x), 1 πv(x)] 2 (71) x X of the subset T. Then, j o and j p are determined as stated below: T p = sup[t h(t)=1], (72) T o = sup[t h(t) > 0], (73) j p = T p, (74) j o = T o, (75) where Eq. (72) describes the biggest subset in S that satisfies h(t)=1, that is, it is completely consistent; and Eq. (73) describes the biggest subset in S that satisfies h(t) > 0, that is, it is not completely inconsistent. With reference to Eq. (72) and Eq. (74), it is feasible that at least j p sources are reliable, because j p represents the number of sources with full agreement. With this in mind, the numerical adaptive combination rule can be stated as follows (cf. Eq. (52)): πv 1,...,n (x)=max [ π j o [ v h(t o ), min π j p v,1 h(t o )] ]. (76) Yager s fusion approach (Yager, 1979) is based on Zadeh s extension principle (Zadeh, 1978) and is defined as follows: [ ] min πv(x i i ) πv 1,...,n (x)= F(x 1, x 2,..., x n ), (77) where x i X and F(x) is an averaging operator. One problem that arises in blindly using the extension principle is that the aggregated possibility distribution may not be satisfactory because it does not reflect any of the source s opinion. For example, if there are two estimates of a person s age, p 1 = 30 and p 2 = 50, then the average is 40. However, this is a value that is not very compatible with either of the estimates. The reason for this lack of compatibility is the attempt to aggregate disparate values. To solve this problem, Yager introduced an "intelligent" component, the so-called compatibility relationship, R, in the merging process to address

24 A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability conflicts in the data to be fused. In this context, the compatibility relationship is defined by expert knowledge. Fusion by considering compatibility is defined as follows (Yager, 1994): [ [ ]] min R(x 1, x 2,..., x n ), min πv(x i i ) πv 1,...,n (x)= F(x 1, x 2,..., x n ), (78) ] where x i X, R(x 1, x 2,..., x n )= min i,j [R(x i, x j ), and F is an averaging operator. As observed in Eq. (78), the merging of incompatible data is indicated by a low possibility degree Fusion rule The possibilistic frameworks introduced in Sect offer a promising setting for merging observations from different sensors. However, both approaches do not consider sensor s reliability. In case of highly unreliable or defective sensors, this might affect the fusion result negatively, which makes both approaches less suited to real-life machine conditioning applications. To overcome the drawbacks mentioned before, this section presents a novel possibilistic data-fusion approach, which is based on Yager s and Dubois frameworks for data fusion (Dubois et al., 2001; Yager, 2004) and the theory of collective group decisions (Eisenführ, 2003). It is an extended close-to-practice approach, which has the ability of considering sensor reliability. Before defining the fusion rule in detail, the hypotheses based on Yager s and Dubois s concepts have been widened are discussed in the following paragraphs. H1. In real life, group decision-making by humans is mainly driven by the concept of majority opinion. This is derived from the fact that unanimous consensus rarely occurs during group decisions. Hence, it is natural to provide a fusion approach for the ability of majority-guided aggregation. H2. During group decision-making processes, decision-makers might have different priorities or reliabilities. It is natural that group decisions are mainly based on the voting of prioritised and reliable decision-makers. Undoubtedly, the desired characteristics are intrinsically vague. Accordingly, different fuzzy approaches assessing majority-guided decisions are ideally suited. In this context, the class of IIWOWA operators, introduced in Sect , is relevant. However, the IIWOWA operator cannot be applied directly to sensors observations, because it is explicitly defined for inputs in the range of[0, 1]. Therefore, the sensor observations are fuzzified to make the data measured applicable to IIWOWA operators. The fuzzification of the sensor observations is accomplished using the Modified-Fuzzy-Pattern-Classifier (Lohweg & Mönks, 2010a). In addition to the necessity of fuzzification because of application of an IIWOWA operator, the fuzzification of the measurement scale has an important practical benefit: the fuzzification process facilitates the usage of different sensors that measure different physical quantities on the same attribute. Considering the preceding discussion, the so-called Majority-Opinion-Guided Possibilistic Fusion Rule (MOGPFR) is defined as follows: where π 1,...,n v (x)=max i [ ˆπ v 1,...,n (x)= ρ i] ˆπ 1,...,n v [ (x)+1 max ρ i], (79) i { } λiiwowa ( v, w p, π v ), (80) λ IIWOWA ( v, w m, μ)

25 214 Sensor Fusion - Foundation and Applications 24 Will-be-set-by-IN-TECH π v = ( ) πv(x 1 1 ),..., πv(x i i ),..., πv(x n n ), μ =(μ 1 (x 1 ),..., μ i (x i ),..., μ n (x n )). The variable μ i (x i ) represents the fuzzified sensor observation x i of the ith sensor S i. Furthermore, π i v(x i ) represents the corresponding possibility distribution. The characteristics of IIWOWA operators can be flexibly adjusted by modifying the importance weighting vector v and the weighting vectors wp and w m (Larsen, 1999). The following paragraphs describe the methods for a problem-dependent evaluation of these parameters, so that the stated hypotheses are satisfied: Consider a n-dimensional fusion problem of a set of n sensors, S = {S 1,..., S i,..., S n }, with their associated reliabilities, {ρ 1,..., ρ i,..., ρ n }. Then, the following properties, which have to be fulfilled by the MOGPFR, can be derived from H1 and H2: Lemma 1. If at least one sensor is completely reliable, the MOGPFR combines the possibility distributions conjunctively, whereas when all sources are unreliable, the MOGPFR combines the possibility distributions disjunctively (cf. Sect ). Lemma 2. The fusion approach of the MOGPFR proceeds progressively from the conjunctive to the disjunctive mode, when the highest reliability among all sources decreases from one to zero (cf. Sect ). The function defined by Eq. (79) satisfies Lemma 1 and 2 iff the andness-degree of the IIWOWA operator of Eq. (80) used for fusing the possibility distributions is determined as follows: [ α p = min ρ i]. (81) i 1,...,n Proof. The satisfaction of Lemma 1 and 2 follows directly from the definition of the OWA and IIWOWA operators (Larsen, 1999; Yager, 1994). Lemma 3. If only one source is fully reliable and all other sources are totally unreliable, the fusion result of the MOGPFR models the possibility distribution provided by the reliable source (cf. H2). The function defined by Eq. (79) satisfies Lemma 3 iff the importance weighting vector v of Eq. (80) is defined as stated below: ( v = ρ 1,..., ρ i,..., ρ n). (82) Proof. Consider that S 1 is totally reliable and all other sources, {S 2,..., S i,..., S n }, are completely unreliable. Hence, with reference to Eq. (82), the importance weighting vector accounts to v =(1, 0,..., 0) and Eq. (79) results in πv 1,...,n (x)= ˆπ v 1,...,n (x), x X. Consider the definition of IIWOWA operators (Larsen, 1999), the importance weighting function mutates to h(0, π i v)=i i = 1, h(1, π 1 v)=π 1 v. Therefore, the importance weighting function models for all sources except S 1 the identity element I and hence, πv 1,...,n (x)= ˆπ v 1,...,n (x)=πv(x) 1 x X.

26 A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability Lemma 4. When all sources are completely unreliable, then the MOGPFR models total ignorance (cf. Sect ). The function defined by Eq. (79) satisfies Lemma 4. Proof. Consider that all sources are totally unreliable. Hence, with reference to Eq. (82), the importance weighting vector accounts to v =(0,..., 0) and Eq. (79) can be written as follows: Thus, Eq. (79) models total ignorance. π 1,...,n v (x)=1, x X. Lemma 5. If there is a conflict between sources, it is solved by the MOGPFR so that the majority observation is prioritised (cf. H1). To meet the requirement postulated in Lemma 5, the majority observation of the sensors has to be evaluated. The evaluation of the majority observation is discussed in Sect Data consistency The evaluation of the majority observation, necessity to satisfy Lemma 5, arises the need of a consistency measurement amongst sensors observations, which is introduced in the following: Consider a set of sensors S = {S 1,..., S i,..., S n } with their corresponding reliabilities {ρ 1,..., ρ i,..., ρ n }. Let each sensor provide an observation through a possibility distribution π i v, i {1,..., n}. Then, the largest set of sensors T c, which forms a consensus observation is defined as follows: T c = sup[t h(t) > 0], (83) where T S, h(t) is the consistency index as defined in Eq. (71). Naturally, observations of sensors which are elements of T c are completely consistent with the consensus observation and therefore, their consistency should be equal to one. In the same way, the consistency of an observation should decrease when the distance to the consensus observation increases. Hence, the measurement of consistency rises the need for evaluating the range of the consensus observation and an appropriate definition for measuring the distance amongst observations. To simplify the measure of consistency, the possibility distribution (observation) of each sensor is defuzzified using its centre of gravity, denoted as C (Klir & Yuan, 1995). The range of the consensus observation, [c min, c max ], can then be calculated as follows: [ c min = min C S i T c ( π i v )], (84) [ ( )] c max = max C πv i. (85) S i T c Knowing the extent of the consensus observation, the measure of consistency can be defined by the following: ( ) ( ) ( ) c min C π i v, C πv i < c min, Co c πv, i ( ) ( ) T c = c max C πv i, C πv i > c max, (86) 1, otherwise.

27 216 Sensor Fusion - Foundation and Applications 26 Will-be-set-by-IN-TECH Considering Eq. (86) sensors that have their centres of gravity within the range of the consensus observation are 100% consistent and, thus, are modelled by Co c (πv, i T c )=1. Furthermore, when the distance of a sensor s observation to the boundaries of the consensus observation increases, the consistency of the observation with reference to the consensus observation decreases, and hence, Co c (πv, i T c )=[0, 1). However, in practical applications, no consensus observation may be found amongst all the sensors, e. g. T c = 1. Then, the measurement of consistency, as defined by Eq. (86), becomes inadequate. Nevertheless, a consistency measure that evaluates the amount of conflict among the sensors is both obvious and adequate. It should be noted that reliabilities amongst sensors can vary. It is debatable whether a reliable sensor, that is in conflict with an unreliable sensor should be considered inconsistent. Accordingly, the consistency measurement should take the reliabilities of sensors into account. WAM meets the desired features stated above and thus, is used as follows: where and [ Co a (πv, i πv)=max 1 max j =i π v = {π j v} j =i, ρ i =(ρ j ) j =i, di =(d i,j ) j =i, d i,j = 1 [r j ], λ WAM ( ρ i, di ) ], (87) ( ) ( C πv i C πv) j. (88) With reference to Eq. (87), the consistency of a sensor s observation is the weighted average of all distances from the observation of the ith sensor πv i to the observations of all other sensors πv. The weighting vector of the weighted arithmetic mean corresponds to the reliabilities of the sensor observations πv. Moreover, due to the max-operator in Eq. (87), the consistency of πv i will be equal to one, if all observations of πv are completely unreliable. Both versions of evaluating the consistency of a sensor s observation are brought together in the following equation: { Co(πv)= i Coc (πv, i T c ), T c > 1, Co a (πv, i πv), (89) otherwise. After determining the consistency of each observation it is natural to consider this information during the fusion process. Thus, an observation with a low consistency should contribute little to the fusion result and vice versa. Therefore, the MOGPFR is modified, so that the consistency index of each observation is explicitly taken into account. From Eq. (80), it follows that the determination of the weighting vector v as defined in Eq. (82) has to be modified to meet the desired features mentioned above and stated in Lemma 5. A functional description, that meets the needs postulated previously is called credibility, denoted as Cr(ρ i, Co(πv)) i = min[ρ i, Co(πv)] i (Yager & Kelman, 1996). Thus, Eq. (82) is modified as follows: ( ) v = Cr(ρ 1, Co(πv)), 1..., Cr(ρ n, Co(πv)) n. (90) Next, whether Eq. (90) is in accordance with Lemma 2 is checked. Proof. The modification of Eq. (82) does not violate Lemma 2, since if all sources {S 2,...S n } except S 1 are unreliable, e. g. v =(1, 0,..., 0) (cf. Eq. (82)) then ( ) v = Cr(1, Co(πv)), 1..., Cr(0, Co(πv)) n = (1, 0,..., 0). With respect to the proof of Lemma 2, only π 1 v is considered.

28 A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability Using Eq. (90) for determining the importance weighting vector v of Eq. (79) satisfies Lemma 5. Proof. Consider a n-dimensional fusion problem of a set of n sources S = {S 1,..., S i,..., S n } and let all sources be reliable, e.. v =(1,..., 1). Moreover, let T c = {S 1,..., S k }. With reference to Eq. (89), the importance weighting vector v becomes v =(1,..., 1, a k+1,..., a n ), where {a k+1,..., a n } < 1 and therefore, the group of sources building the consensus observation, that is the majority observation, is prioritised Sensor reliability As information provided by physical sensors can vary in quality, reliability is important for the success of multi-source data fusion. Two general concepts of obtaining source s reliability are established in literature (Rogova & Nimier, 2004): static and dynamic reliability. Static reliability indicates the probability that a source is working correctly. However, it does not consider unpredictable disturbances, such as environmental influences, mis-applications, or failures caused by accidents. Paying no heed to those ascendancies effectively lowers the performance of a fusion system. That is why here both static reliability, based on expert know-how, and consensus-driven dynamic reliability estimation are used. Consensus-driven approaches presume that unreliable sources result in conflicting situations. In this context, it is assumed that a higher conflict results in a larger distance from the consensus observation. Accordingly, the measurement of consistency (cf. Eq. (89)) is ideally suited for the determination of the reliability of a source. If there are unreliable sources that do not cause conflicts, consensus-driven reliability estimation methods become inadequate. The consistency of a source can vary widely between fusion steps, because of noise in real-life fusion problems. Therefore, it makes sense to smooth the reliability of a source by considering its former reliabilities. The family of exponential moving average filters, introduced below, allows modelling the needs postulated herein. The exponential moving average filter can be classified under infinite impulse response filters and is defined as follows: y[n]=ω x[n]+(1 ω) y[n 1], (91) where ω [0, 1]. The filter output y[n] and the filter input x[n] are defined for the discrete time step n. Moreover, y[n 1] is the filter output at the previous discrete time step [n 1]. Exponential filtering of the consistency of a source allows modelling of its dynamic reliability, ρd[n], i intuitively. Additionally, the static reliability, ρs[n], i can be used as a convex envelope for the smoothed consistency of a source. This leads to the following definition of dynamic reliability: [ ] ρd[n]=min i ρs[n], i ˆρ d[n] i, (92) where and ˆρ i d[n]=ω Co(π i v)+(1 ω) ˆρ i d[n 1], (93) ˆρ i d[n]=1, n < 0. (94) The inertia of a process monitored by a source can be taken into account by aligning ω. Thus, a high inertia should be accounted by a small ω and vice versa. To illustrate the effect of exponential filtering, Fig. 7 depicts the filtered and non-filtered reliability of an arbitrary source. It is clearly visible that the influence of process noise is considerably reduced due to exponential averaging.

29 218 Sensor Fusion - Foundation and Applications 28 Will-be-set-by-IN-TECH ρ(k) k Fig. 7. The smoothed and non-smoothed reliability of an arbitrary source. The dashed line visualises the non-smoothed reliability. The thick line illustrates the smoothed reliability when an exponential moving average filter with ω = 0.2 is applied Trustworthiness of the fusion result An important problem after obtaining a fusion result is the question of its trustworthiness. Delmotte et al. (Delmotte, 2007) proposed an approach that measures the trustworthiness of a fusion result by considering internal contradictions and reliabilities of sources. Here, Delmotte s idea of determining the trustworthiness of fusion results is captured and modified so that it qualifies for the MOGPFR. In Sect , the measurement of credibility was introduced. Here, the average credibility of all sensors is accounted for the trustworthiness of the fusion result. In this context, a high overall credibility should result in a high trustworthiness and vice versa. As reliabilities among sources can vary, it is natural that the trustworthiness should mainly be influenced by highly reliable sources, whereas sources with low reliability should influence the trustworthiness of the fusion result only to a small amount. Consequently, the weighted arithmetic mean is appropriate for calculating the trustworthiness. In this context, the importance weighting vector v equals the reliabilities of the sources to be merged. With reference to the MOGPFR, the consistency index h(t c ), (cf. Eq. (71)), contains information about the trustworthiness of the fusion result too. That is, a high consistency index indicates a high agreement amongst the sources that build the consensus observation. On the contrary, a low consistency index indicates a low harmony in the consensus observation. Accordingly, a high consistency index should result in a high trust in the fusion result and vice versa. As both the overall credibility of the sources and the consistency index are equally important to the trustworthiness of a fusion result, denoted by Tr, it is defined as the average of both the indexes: where ( Tr c = π 1,...,n v ) (x) = 0.5 h(t c )+0.5 λ WAM ( ρ, c), (95) ( ) Cr(ρ 1, Co(πv)), 1..., Cr(ρ n, Co(πv)) n,

30 A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability and ρ = ( ρ 1,..., ρ n). 4.3 Two-Layer Possibilistic Fusion Complex fusion tasks, such as condition monitoring of printing machines, require the fusion of different attributes, because sophisticated processes cannot be described sufficiently by one attribute. In general, an attribute describes the state of a variable that influences the condition of a process to be monitored. Furthermore, an attribute consists of several criteria that determine the attribute s condition. These criteria are monitored by a set of sensors. Thus, the fusion of highly sophisticated processes is a twofold process: i) the criteria corresponding to one particular attribute are fused; ii) the attributes are aggregated into one evidence about the condition of the machine. The fusion approach introduced in this section is called the Two-Layer Possibilistic Fusion Rule (TLPFR). The TLPFR is presented in an application-oriented manner for the purpose of machine conditioning. However, other applications of the TLPFR are also conceivable. Consider a n-dimensional fusion problem of a set of n attributes A = {A 1,..., A i,..., A n }. Furthermore, let each attribute A i consist of m i criteria observed by m i sources S Ai = {S Ai,1,..., S Ai,j,..., S Ai,mi }. Moreover, let each source S Ai,j provide its observation using a possibility distribution π j A i (x). Thus, the fusion of m i criteria into one result about the condition of one particular attribute A i can be considered as a m i -dimensional possibilistic fusion problem. The fusion on the first layer, the so-called criteria-fusion layer, is accomplished using the MOGPFR. Furthermore, the compound consequence about the state of a particular attribute A i is defuzzified using the mean of maxima (Klir & Yuan, 1995) and additionally, the attribute s trustworthiness (cf. Eq. (95)) is considered. Thus, for each attribute, one obtains numerical ( values ) indicating its current condition x Ai and its corresponding trustworthiness Tr (x). Figure 8 illustrates the criteria-fusion layer in its lower part. π 1,...,m i A i After obtaining the condition of each attribute and its related trustworthiness, the attributes conditions are merged on the second layer. In this context, it is obvious that when one attribute of the machine indicates that the machine is in a bad condition, then the holistic condition of the machine should accommodate this condition up to a certain degree. This degree depends on the trustworthiness of an attribute s observation. That is to say, if the trustworthiness of an attribute is high, the holistic condition accounts for this condition to a high degree and vice versa. Therefore, the fusion method on the second layer, denoted as attribute-fusion layer, should pay attention to the trustworthiness of an attribute s observation and should model a high degree of pessimism. Once again, the class of IIWOWA operators qualifies for the fusion on the second layer. The attribute-fusion layer method is defined as follows: where ( π = ( t = x A1,...,A n = λ IIWOWA ( t, w, π ), (96) π 1,2,...,m 1 A 1 Tr(π 1,2,...,m 1 A 1 ) (x),..., π 1,2,...,m n A n (x), (x)),..., Tr(π 1,2,...,m n A n (x)) where w is determined with reference to the desired andness degree, using O Hagens approach of maximum entropy (O Hagen, 1987). The second layer of the TLPFR is depicted in the upper part of Fig. 8. ),

31 220 Sensor Fusion - Foundation and Applications 30 Will-be-set-by-IN-TECH πa1,a2,,an(x) πa1 1,2,3 (x), Tr(πA1 1,2,3 (x)) πa2 1,2 (x), Tr(πA2 1,2 (x)) IIWOWA πan 1,2,3 (x), Tr(πAn 1,2,3 (x)) Attribute- Fusion Layer πa1 1 (x) MOGPFR MOGPFR MOGPFR πa1 2 (x) πa1 3 (x) πa2 1 (x) πa2 2 (x) πan 1 (x) πan 2 (x) πan 3 (x) SA1 1 SA1 2 SA1 3 SA2 1 SA2 2 SAn 1 SAn 2 SAn 3 Criteria- Fusion Layer Fig. 8. The TLPFR for machine conditioning. 5. Application example Nowadays, security prints, such as banknotes are highly sophisticated and exhibit many security features. To reach this high security level, several printing methods like line offset, letter-press printing, foil printing, and intaglio printing are applied. Especially the latter one named printing technique intaglio printing is of major importance for the security of banknotes. The term intaglio is of Italian origin and means to engrave. The printing method of the same name uses a metal plate with engraved characters and structures. Large areas and differences in brightness are produced by different hatchings. During the printing process the engraved structures are filled with ink and pressed under huge pressure directly onto the paper. As a result, a tactile relief and fine lines are formed, unique to the intaglio printing process and almost impossible to reproduce through commercial printing methods. 5.1 Experiments In the steel engraving machine the wiping unit is the most observed part. It is responsible for removing surplus ink around the engravings. Even small parameter manipulations cause errors on products (cf. Fig. 9). Experienced machine operators are able recognise errors before they occur and stabilise the production by changing mainly the wiping unit parameters. In Fig. 9. Wiping error (right) in an intaglio printing process (Glock et al., 2011). total, six sensors are mounted on the intaglio printing machine. The main focus of attention is on the wiping process of the printing machine, because here a large number of printing flaws can be caused (Lohweg & Mönks, 2010a). The following functional components are monitored:

32 A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability The motor current (MC) of the machine s main drive. It is mainly influenced by the friction between the wiping and the plate cylinder. The printing pressure of side 1 1 (PPS1) and the printing pressure of side 2 (PPS2). The pressure of the drying blade onto the wiping cylinder of side 1 (DBPS1) and side 2 (DBPS2). The flow rate of the wiping solution (WSFR), that is, the amount of wiping solution that is sprayed onto the wiping cylinder. An experiment was performed by measuring all six sensor signals when the intaglio printing machine was running (Dyck et al., 2007). The test was performed in two steps: i) the machine was operated in good production mode; ii) the wiping pressure was decreased little-by-little until the machine printed only flawed sheets. For both experiments, a sample frequency of 7 khz was used and the production rate kept constant at 6500 sheets per hour. During the first and the second experiment, 479 sheets (within approximately 4.4 minutes) and 796 sheets (within approximately 7.4 minutes) were printed (Dyck et al., 2007). Sensors with equal causal relationships were arranged to the same attribute. The causality relationships were determined using expertise of the printing machine manufacturer. In this context, a specific machine attribute is related to one particular malfunction, which may cause printing errors and may give rise to machine faults. In this experiment, three machine attributes were monitored. They are stated in the following: A1. Drying Blade Pressure A misalignment of the drying blade pressure, that is, the pressure between the wiping cylinder and the drying blade, may cause so-called wiping errors. In particular, an excessive pressure may ruin the drying blade, whereas an undersized pressure may directly cause flaw print errors. The drying blade pressure is proportional to the motor current (MC) and of course, can be measured by the DBPS1 and DBPS2 sensors. A2. Cleanness of the Wiping Cylinder A dirty wiping cylinder may provoke another type of wiping error. Naturally, the cleaning power of the wiping unit is influenced by the amount of detergent (wiping solution) that is sprayed onto the wiping cylinder. This flow of detergent is monitored by the WSFR sensor. Moreover, dried ink that adheres onto the wiping cylinder rubs against the drying blade and increases the friction between the wiping cylinder and the drying blade. This leads to an increase of the drying blade pressure that can be detected using the DBPS1 and DBPS2 sensors. A3. Printing Pressure A misalignment of the printing pressure may bring out imperfect printed structures. Naturally, the printing pressure is monitored by the PPS1 and PPS2 sensors. 5.2 Performance evaluation of the Two-Layer Possibilistic Fusion Rule With reference to Fig. 10, it is clearly observable that the holistic machine condition decreases gradually because the wiping pressure is decreased little-by-little. With reference to the optical inspection system (the green line in Fig. 10) from sheet number 560 onward, the printing machine produced only low-quality products, that is, wiping errors occurred. Consider a threshold of 50 % (0.5) of max(π(x)) = 1; the TLPFR diagnosed this bad machine condition 1 In the field of printing machines, the side where the machine s main drive is located is called side 1 and the side where the machine s control centre is located is called side 2.

33 222 Sensor Fusion - Foundation and Applications 32 Will-be-set-by-IN-TECH approximately 160 sheets, or 1.47 minutes, prior to the occurrence of the wiping errors. The bad machine condition was detected by the machine s attributes A 1 and A 2 (wiping pressure and cleanness of the wiping cylinder), whilst attribute A 3 indicated a good machine condition. This behaviour of the machine s attributes is intuitive, because the wiping pressure was decreased little-by-little, whilst the printing pressure was kept constant π A1,A 2,A 3 (x) Sheet Number, x π A1 (x) π A2 (x) π A3 (x) Sheet Number, x Sheet Number, x Sheet Number, x Fig. 10. The fusion results of the wiping error experiment. In the plot above, the blue line illustrates the holistic machine condition determined by the TLPFR; and the green line illustrates the membership grades of the optical inspection system. The plots underneath depict the conditions of the attributes. The fuzzyfied values of all the sensors obtained during the wiping error experiment are depicted in Fig. 11. With reference to Fig. 11 (a), all sensors that describe attribute A µ(x) µ(x) µ(x) MC DBPS1 DBPS Sheet Number, x 0.2 WSF DBPS1 DBPS Sheet Number, x 0.2 PPS1 PPS Sheet Number, x (a) (b) (c) Fig. 11. The membership grades of the sensors during the wiping error experiment. Panel (a) illustrates the fuzzified sensor outputs of attribute A 1, (b) of attribute A 2, and (c) of attribute A 3. detected the wiping error. Furthermore, the motor current was highly afflicted with additive noise, which caused slight conflicts. This arose with a decrease of the trustworthiness of A 1 (cf. Fig. 12 (a)) and in a discounted reliability of the motor current sensor (cf. Fig. 12 (d)).

34 A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability The conflicts were mainly solved at sheet number 560, that is, when the printing machine was producing only erroneous sheets. Therefore, the reliability of the MC sensor was upgraded. Considering Fig. 11 (b), the WSFR sensor did not detect the decrease of the wiping pressure, whereas the DBPS1 and the DBPS2 sensors did detect. As a result, the reliability of the WSFR sensor was decreased, until it was considered totally unreliable from sheet number 600 onwards. The trustworthiness of A 2 was lowered because of the conflict between the WSFR sensor and both DBPS sensors. From sheet number 600 onwards, that is, when the reliability of the WSFR sensor accounted to zero, the trustworthiness of A 2 increased steadily until it accounted to one, because the observation of the WSFR sensor was no longer considered during the fusion. As mentioned above, the third attribute did not detect the loss of the wiping pressure. Thus, the membership grades of both sensors remained constant and accounted to one (cf. Fig. 11 (c)). Therefore, no conflicts occurred, and the reliability of both sensors, as well as the trustworthiness of the attribute accounted constantly to one (cf. Fig. 12 (c) and (f)). The decrease of the wiping pressure was clearly indicated in the holistic machine condition, because of the high degree of pessimism (α = 0.8) for the fusion of the attributes, although it was not detected by A Tr(π A1 (x)) Tr(π A2 (x)) Tr(π A3 (x)) Sheet Number, x Sheet Number, x Sheet Number, x (a) (b) (c) ρ(x) ρ(x) ρ(x) MC DBPS1 DBPS Sheet Number, x (d) 0.2 WSFR DBPS1 DBPS Sheet Number, x (e) 0.2 PPS1 PPS Sheet Number, x (f) Fig. 12. The trustworthiness of the attributes conditions and the reliabilities of the sensors during the wiping error experiment. Panel (a) illustrates the trustworthiness of attribute A 1, (b) ofa 2, and (c) of A 3. Furthermore, panel (d) illustrates the reliabilities of the sensors forming attribute A 1,(e) ofa 2, and (f) of A 3. Considering the discussions in this section, one can conclude that the TLPFR is insofar superior to an optical inspection system in respect of print flaws generated by machine errors. This is mainly because faulty machine conditions can be detected prior to the occurrence of printing errors. This makes it possible to readjust the printing machine to avoid print flaws.

35 224 Sensor Fusion - Foundation and Applications 34 Will-be-set-by-IN-TECH 6. Conclusion and outlook In this chapter we have reviewed the nature of knowledge perceived by experts and the representation of incomplete, inconsistent, and vague information in technical systems. Based on various theories, namely: Probability Theory, Evidence Theory, Fuzzy Set Theory, and Possibility Theory, different concept of information fusion in the appearance of incomplete and unreliable data was presented. Furthermore, two human-centric fusion approaches were characterised. In particular, a new possibilistic framework for sensor fusion was presented. In the future we will concentrate on implementation aspects of the above mentioned framework. 7. References Ayyub, B. M. & Klir, G. J. (2006). Uncertainty Modeling and Analysis in Engineering and the Sciences, Chapman and Hall/CRC, Taylor and Francis Group. Bayes, T. P. (1763). An Essay Towards Solving a Problem in the Doctrine of Chances, Philosophical Transactions of the Royal Society of London, London 53: Black, M. (1937). Vagueness. an exercise in logical analysis, Philosophy of Science 4(4): Bocklisch, S. F. & Priber, U. (1986). A parametric fuzzy classification concept, Proc. International Workshop on Fuzzy Sets Applications, Akademie-Verlag,Germany: Bossé, E., Roy, J. & Wark, S. (2007). Concepts, Models, and Tools for Information Fusion, Intelligence and Information Operations Library, Artech House, Boston, Mass. URL: Campos, F. (2006). Decision Making in Uncertain Situations: An Extension to the Mathematical Theory of Evidence, Boca Raton, Florida USA. Carnap, R. (1947). Probability as a guide in life, Journal of Philosophy 44(6): Delmotte, F. (2007). Detection of Defective Sources in the Setting of Possibility Theory, Fuzzy Sets and Systems 5(158): Dempster, A. P. (1967). Upper and Lower Probabilities Induced by a Multivalued Mapping, Annals Mathematics Statistics 28: Dubois, D., Esteva, F., Godo, L. & Prade, H. (2001). An Information-based Discussion of Vagueness, The 10th IEEE International Conference on Fuzzy Systems, Toulouse 2(3): Dubois, D., Foulloy, L., Mauris, G. & Prade, H. (2004). Probability-Possibility Transformations, Triangular Fuzzy Sets, and Probabilistic Inequalities, Reliable Computing 10(5): Dubois, D. & Prade, H. (1978). Operations on Fuzzy Numbers, International Journal of Systems Science 9(6). Dubois, D. & Prade, H. (1983). Unfair Coins and Necessity Measures Towards a Possibilistic Interpretation of Histograms, Fuzzy Sets and Systems 1(10): Dubois, D. & Prade, H. (1994). Possibility Theory and Data Fusion in Poorly Informed Environments, Control Engineering Practice 5(2): Dubois, D. & Prade, H. (2000). Possibility Theory in Information Fusion, Proceedings of the Third International Conference in Information Fusion, Paris 3(1): Dubois, D. & Prade, H. (2003). Possibility Theory and its Applications: A Retrospective and Prospective View, The 12th IEEE International Conference on Fuzzy Systems, San Antonio 5(1): 5 11.

36 A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability Dujmović, J. J. (1974). Weighted Conjunctive and Disjunctive Means and their Application in Systems Evaluation, of the University of Belgrade, EE Dept., Series Mathematics and Physics, Belgrade 483: Dujmović, J. J. & Larsen, H. L. (2007). Generalized Conjunction/Disjunction, International Journal of Approximate Reasoning 46(2): Dyck, W., Türke, T. & Lohweg, V. (2007). A Fuzzy-Pattern-Classifier-Based Adaptive Learning Model for Sensor Fusion, 2007 IEEE Workshop on Machine Learing for Signal Processing, Thessaloniki pp Eisenführ, F. (2003). Rationales Entscheiden, 3 edn, Springer, Berlin. Glock, S., Voth, K.,Schaede, J. G. & Lohweg, V. (2011). A Framework for Possibilistic Multi-source Data Fusion with Monitoring of Sensor Reliability, World Conference on Soft Computing. In: San Francisco, CA, USA, May 23-26, 2011 May Hacking, I. (1975). The Emergence of Probability, Cambridge University Press, Cambridge. Hall, D. L. & Llinas, J. (2001). Handbook of a Multisensor Data Fusion, The electrical engineering and applied signal processing series, CRC Press, Boca Raton, Fla. URL: Keynes, J. M. (1921). A Treatise on Probability, Dover Publications, London. Klir, G. J. & Wierman, M. J. (1998). Uncertainty-Based Information: Elements of Generalized Information Theory (Studies in Fuzziness and Soft Computing), Physica-Verlag. Klir, G. J. & Yuan, Y. (1995). Fuzzy Set and Fuzzy Logic: Theory and Applications, Prentice-Hall Inc., New York. Kolmogorov, A. (1933). Grundbegriffe der Wahrscheinlichkeitsrechnung, 1 edn, Julius Springer, Berlin. Larsen, H. L. (1999). Importance Weighted OWA Aggregation of Multicriteria Queries, 18th International Conference of the North American Fuzzy Information Processing Society, New York pp Larsen, H. L. (2002). Efficient Importance Weighted Aggregation Between Min and Max, 9th Conference on Information Processing an Management of Uncertainty in Knowledgebased Systems, Annecy 1(1): Li, R. & Lohweg, V. (2008). A Novel Data Fusion Approach using Two-Layer Conflict Solving, IAPR Workshop on Cognitive Information Processing, Santorini pp Lipshitz, R., Klein, G., Orasanu, J. & Salas, E. (2001). Taking Stock of Naturalistic Decision Making, Journal of Behavioral Decision Making 14: Lohweg, V. & Mönks, U. (2010a). Fuzzy-Pattern-Classifier based Sensor Fusion for Machine Conditioning, Sensor Fusion, I-TECH Education and Publishing, Vienna. Lohweg, V. & Mönks, U. (2010b). Sensor Fusion by Two-Layer Conflict Solving, The 2nd International Workshop on Cognitive Information Processing, Elba 2(1): Murphy, C. K. (2000). Combining Belief Functions when Evidence Conflicts., Decision Support Systems 29(1): 1 9. O Hagen, M. (1987). Fuzzy Decision Aids, Twenty-first Asiomar Conference on Signal, Systems and Computers,, Pacific Grove 21(2): Popper, K. R. (1934). The Logic of Scientific Discovery, Routledge; Reprint edition (October 8, 1992), London. Ramsey, F. P. (1960). The Foundations of Mathematics and Other Logical Essays, Paterson, N.J.,Littlefield, Adams.

37 226 Sensor Fusion - Foundation and Applications 36 Will-be-set-by-IN-TECH Rogova, G. L. & Nimier, V. (2004). Reliability in Information Fusion: Literature Survey, Proceedings of the Seventh International Conference on Information Fusion, Stockholm pp Salicone, S. (2007). Measurement Uncertainty - An Approach via the Mathematical Theory of Evidence, Springer, New York. Schubert, J. (2007). An information fusion demonstrator for tactical intelligence processing in network-based defense., Journal Information Fusion 8(1). Shafer, G. (1976). A Mathematical Theory of Evidence, 1 edn, Princeton University Press, Princeton. Smarandache, F. & Dezert, J. (2006). Advances and Applications on DSmT for Information Fusion: Collected Works 1 (2), American Research Press, Rehboth USA. Sunita, S. A. (1999). Order Effects and Memory for Evidence in Individual versus Group Decision Making in Auditing, Journal of Behavioral Decision Making 12: Yager, R. R. (1979). Possibilistic Decisionmaking, IEEE Transactions on Systems, Man and Cybernetics 9(2): Yager, R. R. (1987). On the Dempster-Shafer Framework and New Combination Rules, Information Sciences 41(2): Yager, R. R. (1988). On Ordered Weighted Averaging Aggregation Operators in Multi-criteria Decision Making, IEEE Transactions on Systems, Man and Cybernetics 18: Yager, R. R. (1994). Aggregation Operators and Fuzzy Systems Modeling, Fuzzy Sets and Systems 67(2): Yager, R. R. (2004). A Framework for Multi-source Data Fusion, Information Sciences 163(1-3): Yager, R. R. & Kelman, A. (1996). Fusion of Fuzzy Information With Considerations for Compatibility, Partial Aggregation, and Reinforcement, International Journal of Approximate Reasoning 15(2): Yager, R. R. & Liu, L. (2008). Classic Works of the Dempster-Shafer Theory of Belief Functions, Springer, New York. Zadeh, L. A. (1965). Fuzzy Sets, Information and Control 8. Zadeh, L. A. (1978). Fuzzy Sets as a Basis for a Theory of Possibility, Fuzzy Sets and Systems 1: Zadeh, L. A. (1986). A simple view of the dempster-shafer theory of evidence and its implication for the rule of combination., AI Magazine 7(2): Zadeh, L. A. (2008). Toward Human Level Machine Intelligence - Is It Achievable? The Need for a Paradigm Shift, IEEE Computational Intelligence Magazine 3(3):

38 Sensor Fusion - Foundation and Applications Edited by Dr. Ciza Thomas ISBN Hard cover, 226 pages Publisher InTech Published online 24, June, 2011 Published in print edition June, 2011 Sensor Fusion - Foundation and Applications comprehensively covers the foundation and applications of sensor fusion. This book provides some novel ideas, theories, and solutions related to the research areas in the field of sensor fusion. The book explores some of the latest practices and research works in the area of sensor fusion. The book contains chapters with different methods of sensor fusion for different engineering as well as non-engineering applications. Advanced applications of sensor fusion in the areas of mobile robots, automatic vehicles, airborne threats, agriculture, medical field and intrusion detection are covered in this book. Sufficient evidences and analyses have been provided in the chapter to show the effectiveness of sensor fusion in various applications. This book would serve as an invaluable reference for professionals involved in various applications of sensor fusion. How to reference In order to correctly reference this scholarly work, feel free to copy and paste the following: Volker Lohweg, Karl Voth and Stefan Glock (2011). A Possibilistic Framework for Sensor Fusion with Monitoring of Sensor Reliability, Sensor Fusion - Foundation and Applications, Dr. Ciza Thomas (Ed.), ISBN: , InTech, Available from: InTech Europe University Campus STeP Ri Slavka Krautzeka 83/A Rijeka, Croatia Phone: +385 (51) Fax: +385 (51) InTech China Unit 405, Office Block, Hotel Equatorial Shanghai No.65, Yan An Road (West), Shanghai, , China Phone: Fax:

Sequential adaptive combination of unreliable sources of evidence

Sequential adaptive combination of unreliable sources of evidence Sequential adaptive combination of unreliable sources of evidence Zhun-ga Liu, Quan Pan, Yong-mei Cheng School of Automation Northwestern Polytechnical University Xi an, China Email: liuzhunga@gmail.com

More information

A NEW CLASS OF FUSION RULES BASED ON T-CONORM AND T-NORM FUZZY OPERATORS

A NEW CLASS OF FUSION RULES BASED ON T-CONORM AND T-NORM FUZZY OPERATORS A NEW CLASS OF FUSION RULES BASED ON T-CONORM AND T-NORM FUZZY OPERATORS Albena TCHAMOVA, Jean DEZERT and Florentin SMARANDACHE Abstract: In this paper a particular combination rule based on specified

More information

Uncertainty and Rules

Uncertainty and Rules Uncertainty and Rules We have already seen that expert systems can operate within the realm of uncertainty. There are several sources of uncertainty in rules: Uncertainty related to individual rules Uncertainty

More information

Fuzzy Systems. Possibility Theory.

Fuzzy Systems. Possibility Theory. Fuzzy Systems Possibility Theory Rudolf Kruse Christian Moewes {kruse,cmoewes}@iws.cs.uni-magdeburg.de Otto-von-Guericke University of Magdeburg Faculty of Computer Science Department of Knowledge Processing

More information

Entropy and Specificity in a Mathematical Theory of Evidence

Entropy and Specificity in a Mathematical Theory of Evidence Entropy and Specificity in a Mathematical Theory of Evidence Ronald R. Yager Abstract. We review Shafer s theory of evidence. We then introduce the concepts of entropy and specificity in the framework

More information

Today s s lecture. Lecture 16: Uncertainty - 6. Dempster-Shafer Theory. Alternative Models of Dealing with Uncertainty Information/Evidence

Today s s lecture. Lecture 16: Uncertainty - 6. Dempster-Shafer Theory. Alternative Models of Dealing with Uncertainty Information/Evidence Today s s lecture Lecture 6: Uncertainty - 6 Alternative Models of Dealing with Uncertainty Information/Evidence Dempster-Shaffer Theory of Evidence Victor Lesser CMPSCI 683 Fall 24 Fuzzy logic Logical

More information

Fuzzy Systems. Possibility Theory

Fuzzy Systems. Possibility Theory Fuzzy Systems Possibility Theory Prof. Dr. Rudolf Kruse Christoph Doell {kruse,doell}@iws.cs.uni-magdeburg.de Otto-von-Guericke University of Magdeburg Faculty of Computer Science Department of Knowledge

More information

A Class of DSm Conditioning Rules 1

A Class of DSm Conditioning Rules 1 Class of DSm Conditioning Rules 1 Florentin Smarandache, Mark lford ir Force Research Laboratory, RIE, 525 Brooks Rd., Rome, NY 13441-4505, US bstract: In this paper we introduce two new DSm fusion conditioning

More information

On the Relation of Probability, Fuzziness, Rough and Evidence Theory

On the Relation of Probability, Fuzziness, Rough and Evidence Theory On the Relation of Probability, Fuzziness, Rough and Evidence Theory Rolly Intan Petra Christian University Department of Informatics Engineering Surabaya, Indonesia rintan@petra.ac.id Abstract. Since

More information

A Simple Proportional Conflict Redistribution Rule

A Simple Proportional Conflict Redistribution Rule A Simple Proportional Conflict Redistribution Rule Florentin Smarandache Dept. of Mathematics Univ. of New Mexico Gallup, NM 8730 U.S.A. smarand@unm.edu Jean Dezert ONERA/DTIM/IED 29 Av. de la Division

More information

Basic Probabilistic Reasoning SEG

Basic Probabilistic Reasoning SEG Basic Probabilistic Reasoning SEG 7450 1 Introduction Reasoning under uncertainty using probability theory Dealing with uncertainty is one of the main advantages of an expert system over a simple decision

More information

Reasoning with Uncertainty

Reasoning with Uncertainty Reasoning with Uncertainty Representing Uncertainty Manfred Huber 2005 1 Reasoning with Uncertainty The goal of reasoning is usually to: Determine the state of the world Determine what actions to take

More information

arxiv: v1 [cs.ai] 4 Sep 2007

arxiv: v1 [cs.ai] 4 Sep 2007 Qualitative Belief Conditioning Rules (QBCR) arxiv:0709.0522v1 [cs.ai] 4 Sep 2007 Florentin Smarandache Department of Mathematics University of New Mexico Gallup, NM 87301, U.S.A. smarand@unm.edu Jean

More information

Probabilistic Reasoning

Probabilistic Reasoning Course 16 :198 :520 : Introduction To Artificial Intelligence Lecture 7 Probabilistic Reasoning Abdeslam Boularias Monday, September 28, 2015 1 / 17 Outline We show how to reason and act under uncertainty.

More information

arxiv: v1 [cs.cv] 11 Jun 2008

arxiv: v1 [cs.cv] 11 Jun 2008 HUMAN EXPERTS FUSION FOR IMAGE CLASSIFICATION Arnaud MARTIN and Christophe OSSWALD arxiv:0806.1798v1 [cs.cv] 11 Jun 2008 Abstract In image classification, merging the opinion of several human experts is

More information

Contradiction Measures and Specificity Degrees of Basic Belief Assignments

Contradiction Measures and Specificity Degrees of Basic Belief Assignments Contradiction Measures and Specificity Degrees of Basic Belief Assignments Florentin Smarandache Arnaud Martin Christophe Osswald Originally published as: Smarandache F., Martin A., Osswald C - Contradiction

More information

Using Fuzzy Logic as a Complement to Probabilistic Radioactive Waste Disposal Facilities Safety Assessment -8450

Using Fuzzy Logic as a Complement to Probabilistic Radioactive Waste Disposal Facilities Safety Assessment -8450 Using Fuzzy Logic as a Complement to Probabilistic Radioactive Waste Disposal Facilities Safety Assessment -8450 F. L. De Lemos CNEN- National Nuclear Energy Commission; Rua Prof. Mario Werneck, s/n, BH

More information

arxiv:cs/ v2 [cs.ai] 29 Nov 2006

arxiv:cs/ v2 [cs.ai] 29 Nov 2006 Belief Conditioning Rules arxiv:cs/0607005v2 [cs.ai] 29 Nov 2006 Florentin Smarandache Department of Mathematics, University of New Mexico, Gallup, NM 87301, U.S.A. smarand@unm.edu Jean Dezert ONERA, 29

More information

Application of New Absolute and Relative Conditioning Rules in Threat Assessment

Application of New Absolute and Relative Conditioning Rules in Threat Assessment Application of New Absolute and Relative Conditioning Rules in Threat Assessment Ksawery Krenc C4I Research and Development Department OBR CTM S.A. Gdynia, Poland Email: ksawery.krenc@ctm.gdynia.pl Florentin

More information

The maximum Deng entropy

The maximum Deng entropy The maximum Deng entropy Bingyi Kang a, Yong Deng a,b,c, a School of Computer and Information Science, Southwest University, Chongqing, 40075, China b School of Electronics and Information, Northwestern

More information

Fusion of imprecise beliefs

Fusion of imprecise beliefs Jean Dezert 1, Florentin Smarandache 2 1 ONERA, 29 Av. de la Division Leclerc 92320, Chatillon, France 2 Department of Mathematics University of New Mexico Gallup, NM 8730, U.S.A. Fusion of imprecise beliefs

More information

Hierarchical Proportional Redistribution Principle for Uncertainty Reduction and BBA Approximation

Hierarchical Proportional Redistribution Principle for Uncertainty Reduction and BBA Approximation Hierarchical Proportional Redistribution Principle for Uncertainty Reduction and BBA Approximation Jean Dezert Deqiang Han Zhun-ga Liu Jean-Marc Tacnet Abstract Dempster-Shafer evidence theory is very

More information

Context-dependent Combination of Sensor Information in Dempster-Shafer Theory for BDI

Context-dependent Combination of Sensor Information in Dempster-Shafer Theory for BDI Context-dependent Combination of Sensor Information in Dempster-Shafer Theory for BDI Sarah Calderwood Kevin McAreavey Weiru Liu Jun Hong Abstract There has been much interest in the Belief-Desire-Intention

More information

AN INTRODUCTION TO DSMT IN INFORMATION FUSION. Jean Dezert and Florentin Smarandache

AN INTRODUCTION TO DSMT IN INFORMATION FUSION. Jean Dezert and Florentin Smarandache BRAIN. Broad Research in Artificial Intelligence and Neuroscience, ISSN 2067-3957, Volume 1, October 2010, Special Issue on Advances in Applied Sciences, Eds Barna Iantovics, Marius Mǎruşteri, Rodica-M.

More information

Analyzing the degree of conflict among belief functions.

Analyzing the degree of conflict among belief functions. Analyzing the degree of conflict among belief functions. Liu, W. 2006). Analyzing the degree of conflict among belief functions. Artificial Intelligence, 17011)11), 909-924. DOI: 10.1016/j.artint.2006.05.002

More information

Multiplication of Multinomial Subjective Opinions

Multiplication of Multinomial Subjective Opinions Multiplication of Multinomial Subjective Opinions Audun Jøsang 1 and Stephen O Hara 2 1 UNIK Graduate Center University of Oslo, Norway josang@unik.no 2 21st Century Systems Inc. USA sohara@21csi.com Abstract.

More information

arxiv:cs/ v1 [cs.ai] 6 Sep 2004

arxiv:cs/ v1 [cs.ai] 6 Sep 2004 The Generalized Pignistic Transformation Jean Dezert Florentin Smarandache Milan Daniel ONERA Dpt.of Mathematics Institute of Computer Science 9 Av. de la Div. Leclerc Univ. of New Mexico Academy of Sciences

More information

Deng entropy in hyper power set and super power set

Deng entropy in hyper power set and super power set Deng entropy in hyper power set and super power set Bingyi Kang a, Yong Deng a,b, a School of Computer and Information Science, Southwest University, Chongqing, 40075, China b Institute of Integrated Automation,

More information

Handling imprecise and uncertain class labels in classification and clustering

Handling imprecise and uncertain class labels in classification and clustering Handling imprecise and uncertain class labels in classification and clustering Thierry Denœux 1 1 Université de Technologie de Compiègne HEUDIASYC (UMR CNRS 6599) COST Action IC 0702 Working group C, Mallorca,

More information

Imprecise Probability

Imprecise Probability Imprecise Probability Alexander Karlsson University of Skövde School of Humanities and Informatics alexander.karlsson@his.se 6th October 2006 0 D W 0 L 0 Introduction The term imprecise probability refers

More information

Introduction to belief functions

Introduction to belief functions Introduction to belief functions Thierry Denœux 1 1 Université de Technologie de Compiègne HEUDIASYC (UMR CNRS 6599) http://www.hds.utc.fr/ tdenoeux Spring School BFTA 2011 Autrans, April 4-8, 2011 Thierry

More information

Classical Belief Conditioning and its Generalization to DSm Theory

Classical Belief Conditioning and its Generalization to DSm Theory Journal of Uncertain Systems Vol.2, No.4, pp.267-279, 2008 Online at: www.jus.org.uk Classical Belief Conditioning and its Generalization to DSm Theory ilan Daniel Institute of Computer Science, Academy

More information

Combining Belief Functions Issued from Dependent Sources

Combining Belief Functions Issued from Dependent Sources Combining Belief Functions Issued from Dependent Sources MARCO E.G.V. CATTANEO ETH Zürich, Switzerland Abstract Dempster s rule for combining two belief functions assumes the independence of the sources

More information

The Semi-Pascal Triangle of Maximum Deng Entropy

The Semi-Pascal Triangle of Maximum Deng Entropy The Semi-Pascal Triangle of Maximum Deng Entropy Xiaozhuan Gao a, Yong Deng a, a Institute of Fundamental and Frontier Science, University of Electronic Science and Technology of China, Chengdu, 610054,

More information

Adaptative combination rule and proportional conflict redistribution rule for information fusion

Adaptative combination rule and proportional conflict redistribution rule for information fusion Adaptative combination rule and proportional conflict redistribution rule for information fusion M. C. Florea 1, J. Dezert 2, P. Valin 3, F. Smarandache 4, Anne-Laure Jousselme 3 1 Radiocommunication &

More information

Fuzzy Systems. Introduction

Fuzzy Systems. Introduction Fuzzy Systems Introduction Prof. Dr. Rudolf Kruse Christoph Doell {kruse,doell}@iws.cs.uni-magdeburg.de Otto-von-Guericke University of Magdeburg Faculty of Computer Science Department of Knowledge Processing

More information

General combination rules for qualitative and quantitative beliefs

General combination rules for qualitative and quantitative beliefs General combination rules for qualitative and quantitative beliefs Arnaud Martin, Christophe Osswald E 3 I 2 EA387 ENSIETA 2 rue François Verny, 2980 Brest Cedex 09, France. Email:Arnaud.Martin,Christophe.Osswald@ensieta.fr

More information

Fuzzy Systems. Introduction

Fuzzy Systems. Introduction Fuzzy Systems Introduction Prof. Dr. Rudolf Kruse Christian Moewes {kruse,cmoewes}@iws.cs.uni-magdeburg.de Otto-von-Guericke University of Magdeburg Faculty of Computer Science Department of Knowledge

More information

Is Entropy Enough to Evaluate the Probability Transformation Approach of Belief Function?

Is Entropy Enough to Evaluate the Probability Transformation Approach of Belief Function? Is Entropy Enough to Evaluate the Probability Transformation Approach of Belief Function? Deqiang Han Jean Dezert Chongzhao Han Yi Yang Originally published as Han D., Dezert J., Han C., Is Entropy Enough

More information

Neutrosophic Masses & Indeterminate Models.

Neutrosophic Masses & Indeterminate Models. Neutrosophic Masses & Indeterminate Models. Applications to Information Fusion Florentin Smarandache Mathematics Department The University of New Mexico 705 Gurley Ave., Gallup, NM 8730, USA E-mail: smarand@unm.edu

More information

REASONING UNDER UNCERTAINTY: CERTAINTY THEORY

REASONING UNDER UNCERTAINTY: CERTAINTY THEORY REASONING UNDER UNCERTAINTY: CERTAINTY THEORY Table of Content Introduction Certainty Theory Definition Certainty Theory: Values Interpretation Certainty Theory: Representation Certainty Factor Propagation

More information

Data Fusion with Imperfect Implication Rules

Data Fusion with Imperfect Implication Rules Data Fusion with Imperfect Implication Rules J. N. Heendeni 1, K. Premaratne 1, M. N. Murthi 1 and M. Scheutz 2 1 Elect. & Comp. Eng., Univ. of Miami, Coral Gables, FL, USA, j.anuja@umiami.edu, kamal@miami.edu,

More information

Uncertain Logic with Multiple Predicates

Uncertain Logic with Multiple Predicates Uncertain Logic with Multiple Predicates Kai Yao, Zixiong Peng Uncertainty Theory Laboratory, Department of Mathematical Sciences Tsinghua University, Beijing 100084, China yaok09@mails.tsinghua.edu.cn,

More information

UNIFICATION OF FUSION THEORY (UFT)

UNIFICATION OF FUSION THEORY (UFT) Technical Sciences and Applied Mathematics UNIFICATION OF FUSION THEORY (UFT) Florentin SMARANDACHE Department of Mathematics and Sciences, University of New Mexico, Gallup, USA Abstract: Since no fusion

More information

Evidence combination for a large number of sources

Evidence combination for a large number of sources Evidence combination for a large number of sources Kuang Zhou a, Arnaud Martin b, and Quan Pan a a. Northwestern Polytechnical University, Xi an, Shaanxi 710072, PR China. b. DRUID, IRISA, University of

More information

Threat assessment of a possible Vehicle-Born Improvised Explosive Device using DSmT

Threat assessment of a possible Vehicle-Born Improvised Explosive Device using DSmT Threat assessment of a possible Vehicle-Born Improvised Explosive Device using DSmT Jean Dezert French Aerospace Lab. ONERA/DTIM/SIF 29 Av. de la Div. Leclerc 92320 Châtillon, France. jean.dezert@onera.fr

More information

Analyzing the Combination of Conflicting Belief Functions.

Analyzing the Combination of Conflicting Belief Functions. Analyzing the Combination of Conflicting Belief Functions. Philippe Smets IRIDIA Université Libre de Bruxelles 50 av. Roosevelt, CP 194-6, 1050 Bruxelles, Belgium psmets@ulb.ac.be http://iridia.ulb.ac.be/

More information

arxiv:cs/ v3 [cs.ai] 25 Mar 2005

arxiv:cs/ v3 [cs.ai] 25 Mar 2005 Proportional Conflict Redistribution Rules for Information Fusion arxiv:cs/0408064v3 [cs.ai] 25 Mar 2005 Florentin Smarandache Dept. of Mathematics Univ. of New Mexico Gallup, NM 8730 U.S.A. smarand@unm.edu

More information

Counter-examples to Dempster s rule of combination

Counter-examples to Dempster s rule of combination Jean Dezert 1, Florentin Smarandache 2, Mohammad Khoshnevisan 3 1 ONERA, 29 Av. de la Division Leclerc 92320, Chatillon, France 2 Department of Mathematics University of New Mexico Gallup, NM 8730, U.S.A.

More information

Probability theory basics

Probability theory basics Probability theory basics Michael Franke Basics of probability theory: axiomatic definition, interpretation, joint distributions, marginalization, conditional probability & Bayes rule. Random variables:

More information

Compenzational Vagueness

Compenzational Vagueness Compenzational Vagueness Milan Mareš Institute of information Theory and Automation Academy of Sciences of the Czech Republic P. O. Box 18, 182 08 Praha 8, Czech Republic mares@utia.cas.cz Abstract Some

More information

1.9 APPLICATION OF EVIDENCE THEORY TO QUANTIFY UNCERTAINTY IN FORECAST OF HURRICANE PATH

1.9 APPLICATION OF EVIDENCE THEORY TO QUANTIFY UNCERTAINTY IN FORECAST OF HURRICANE PATH 1.9 APPLICATION OF EVIDENCE THEORY TO QUANTIFY UNCERTAINTY IN FORECAST OF HURRICANE PATH Svetlana V. Poroseva, Julie Letschert** and M. Yousuff Hussaini School of Computational Science, Florida State University,

More information

An AI-ish view of Probability, Conditional Probability & Bayes Theorem

An AI-ish view of Probability, Conditional Probability & Bayes Theorem An AI-ish view of Probability, Conditional Probability & Bayes Theorem Review: Uncertainty and Truth Values: a mismatch Let action A t = leave for airport t minutes before flight. Will A 15 get me there

More information

10/18/2017. An AI-ish view of Probability, Conditional Probability & Bayes Theorem. Making decisions under uncertainty.

10/18/2017. An AI-ish view of Probability, Conditional Probability & Bayes Theorem. Making decisions under uncertainty. An AI-ish view of Probability, Conditional Probability & Bayes Theorem Review: Uncertainty and Truth Values: a mismatch Let action A t = leave for airport t minutes before flight. Will A 15 get me there

More information

The Unnormalized Dempster s Rule of Combination: a New Justification from the Least Commitment Principle and some Extensions

The Unnormalized Dempster s Rule of Combination: a New Justification from the Least Commitment Principle and some Extensions J Autom Reasoning manuscript No. (will be inserted by the editor) 0 0 0 The Unnormalized Dempster s Rule of Combination: a New Justification from the Least Commitment Principle and some Extensions Frédéric

More information

A generic framework for resolving the conict in the combination of belief structures E. Lefevre PSI, Universite/INSA de Rouen Place Emile Blondel, BP

A generic framework for resolving the conict in the combination of belief structures E. Lefevre PSI, Universite/INSA de Rouen Place Emile Blondel, BP A generic framework for resolving the conict in the combination of belief structures E. Lefevre PSI, Universite/INSA de Rouen Place Emile Blondel, BP 08 76131 Mont-Saint-Aignan Cedex, France Eric.Lefevre@insa-rouen.fr

More information

Scientific/Technical Approach

Scientific/Technical Approach Network based Hard/Soft Information Fusion: Soft Information and its Fusion Ronald R. Yager, Tel. 212 249 2047, E Mail: yager@panix.com Objectives: Support development of hard/soft information fusion Develop

More information

An introduction to DSmT

An introduction to DSmT An introduction to DSmT Jean Dezert Florentin Smarandache The French Aerospace Lab., Chair of Math. & Sciences Dept., ONERA/DTIM/SIF, University of New Mexico, Chemin de la Hunière, 200 College Road, F-91761

More information

Possibilistic Logic. Damien Peelman, Antoine Coulon, Amadou Sylla, Antoine Dessaigne, Loïc Cerf, Narges Hadji-Hosseini.

Possibilistic Logic. Damien Peelman, Antoine Coulon, Amadou Sylla, Antoine Dessaigne, Loïc Cerf, Narges Hadji-Hosseini. Possibilistic Logic Damien Peelman, Antoine Coulon, Amadou Sylla, Antoine Dessaigne, Loïc Cerf, Narges Hadji-Hosseini November 21, 2005 1 Introduction In real life there are some situations where only

More information

On Conditional Independence in Evidence Theory

On Conditional Independence in Evidence Theory 6th International Symposium on Imprecise Probability: Theories and Applications, Durham, United Kingdom, 2009 On Conditional Independence in Evidence Theory Jiřina Vejnarová Institute of Information Theory

More information

A Static Evidential Network for Context Reasoning in Home-Based Care Hyun Lee, Member, IEEE, Jae Sung Choi, and Ramez Elmasri, Member, IEEE

A Static Evidential Network for Context Reasoning in Home-Based Care Hyun Lee, Member, IEEE, Jae Sung Choi, and Ramez Elmasri, Member, IEEE 1232 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART A: SYSTEMS AND HUMANS, VOL. 40, NO. 6, NOVEMBER 2010 A Static Evidential Network for Context Reasoning in Home-Based Care Hyun Lee, Member,

More information

Origins of Probability Theory

Origins of Probability Theory 1 16.584: INTRODUCTION Theory and Tools of Probability required to analyze and design systems subject to uncertain outcomes/unpredictability/randomness. Such systems more generally referred to as Experiments.

More information

Unification of Fusion Theories (UFT)

Unification of Fusion Theories (UFT) Unification of Fusion Theories (UFT) Florentin Smarandache Department of Mathematics and Sciences University of New Mexico 200 College Road Gallup, NM 87301, USA smarand@unm.edu Abstract: Since no fusion

More information

Decision of Prognostics and Health Management under Uncertainty

Decision of Prognostics and Health Management under Uncertainty Decision of Prognostics and Health Management under Uncertainty Wang, Hong-feng Department of Mechanical and Aerospace Engineering, University of California, Irvine, 92868 ABSTRACT The decision making

More information

An Alternative Combination Rule for Evidential Reasoning

An Alternative Combination Rule for Evidential Reasoning An Alternative Combination Rule for Evidential Reasoning Faouzi Sebbak, Farid Benhammadi, M hamed Mataoui, Sofiane Bouznad and Yacine Amirat AI Laboratory, Ecole Militaire Polytechnique, Bordj el Bahri,

More information

Previous Accomplishments. Focus of Research Iona College. Focus of Research Iona College. Publication List Iona College. Journals

Previous Accomplishments. Focus of Research Iona College. Focus of Research Iona College. Publication List Iona College. Journals Network-based Hard/Soft Information Fusion: Soft Information and its Fusion Ronald R. Yager, Tel. 212 249 2047, E-Mail: yager@panix.com Objectives: Support development of hard/soft information fusion Develop

More information

An Improved Focal Element Control Rule

An Improved Focal Element Control Rule vailable online at www.sciencedirect.com Procedia ngineering 5 (0) 7 dvanced in Control ngineeringand Information Science n Improved Focal lement Control Rule JIN Hong-bin a, LN Jiang-qiao b a* a ir Force

More information

Belief functions: A gentle introduction

Belief functions: A gentle introduction Belief functions: A gentle introduction Seoul National University Professor Fabio Cuzzolin School of Engineering, Computing and Mathematics Oxford Brookes University, Oxford, UK Seoul, Korea, 30/05/18

More information

Outline. On Premise Evaluation On Conclusion Entailment. 1 Imperfection : Why and What. 2 Imperfection : How. 3 Conclusions

Outline. On Premise Evaluation On Conclusion Entailment. 1 Imperfection : Why and What. 2 Imperfection : How. 3 Conclusions Outline 1 Imperfection : Why and What 2 Imperfection : How On Premise Evaluation On Conclusion Entailment 3 Conclusions Outline 1 Imperfection : Why and What 2 Imperfection : How On Premise Evaluation

More information

Application of Evidence Theory and Discounting Techniques to Aerospace Design

Application of Evidence Theory and Discounting Techniques to Aerospace Design Application of Evidence Theory and Discounting Techniques to Aerospace Design Fiona Browne 1, David Bell 1, Weiru Liu 1, Yan Jin 1, Colm Higgins 1, Niall Rooney 2, Hui Wang 2, and Jann Müller 3 1 School

More information

The cautious rule of combination for belief functions and some extensions

The cautious rule of combination for belief functions and some extensions The cautious rule of combination for belief functions and some extensions Thierry Denœux UMR CNRS 6599 Heudiasyc Université de Technologie de Compiègne BP 20529 - F-60205 Compiègne cedex - France Thierry.Denoeux@hds.utc.fr

More information

Evaluations of Evidence Combination Rules in Terms of Statistical Sensitivity and Divergence

Evaluations of Evidence Combination Rules in Terms of Statistical Sensitivity and Divergence Evaluations of Evidence Combination Rules in Terms of Statistical Sensitivity and Divergence Deqiang Han Center for Information Engineering Science Research School of Electronic and Information Engineering

More information

Combination of beliefs on hybrid DSm models

Combination of beliefs on hybrid DSm models Jean Dezert 1, Florentin Smarandache 2 1 ONERA, 29 Av. de la Division Leclerc 92320, Chatillon, France 2 Department of Mathematics University of New Mexico Gallup, NM 8730, U.S.A. Combination of beliefs

More information

A New ER-MCDA Mapping for Decision-Making based on Imperfect Information

A New ER-MCDA Mapping for Decision-Making based on Imperfect Information A New ER-MCDA Mapping for Decision-Making based on Imperfect Information Simon Carladous 1,2,4, Jean-Marc Tacnet 1, Jean Dezert 3, Guillaume Dupouy 1, and Mireille Batton-Hubert 4 1 Université Grenoble

More information

This article is published in Journal of Multiple-Valued Logic and Soft Computing 2008, 15(1), 5-38.

This article is published in Journal of Multiple-Valued Logic and Soft Computing 2008, 15(1), 5-38. Audun Jøsang. Conditional Reasoning with Subjective Logic. This article is published in Journal of Multiple-Valued Logic and Soft Computing 2008, 15(1), 5-38. Published in DUO with permission from Old

More information

Inquiry Calculus and the Issue of Negative Higher Order Informations

Inquiry Calculus and the Issue of Negative Higher Order Informations Article Inquiry Calculus and the Issue of Negative Higher Order Informations H. R. Noel van Erp, *, Ronald O. Linger and Pieter H. A. J. M. van Gelder,2 ID Safety and Security Science Group, TU Delft,

More information

Foundations for a new theory of plausible and paradoxical reasoning

Foundations for a new theory of plausible and paradoxical reasoning Foundations for a new theory of plausible and paradoxical reasoning Jean Dezert Onera, DTIM/IED, 29 Avenue de la Division Leclerc, 92320 Châtillon, France Jean.Dezert@onera.fr Abstract. This paper brings

More information

D-S Evidence Theory Applied to Fault 1 Diagnosis of Generator Based on Embedded Sensors

D-S Evidence Theory Applied to Fault 1 Diagnosis of Generator Based on Embedded Sensors D-S Evidence Theory Applied to Fault 1 Diagnosis of Generator Based on Sensors Du Qingdong, Xu Lingyu, Zhao Hai School of Information Engineering, Northeastern University Shenyang 110006, China cn_dudong@yahoo.com

More information

A new generalization of the proportional conflict redistribution rule stable in terms of decision

A new generalization of the proportional conflict redistribution rule stable in terms of decision Arnaud Martin 1, Christophe Osswald 2 1,2 ENSIETA E 3 I 2 Laboratory, EA 3876, 2, rue Francois Verny, 29806 Brest Cedex 9, France. A new generalization of the proportional conflict redistribution rule

More information

An introduction to DSmT

An introduction to DSmT Jean Dezert 1, Florentin Smarandache 2 1 French Aerospace Research Lab., ONERA/DTIM/SIF, 29 Avenue de la Division Leclerc, 92320 Chatillon, France 2 Department of Mathematics University of New Mexico Gallup,

More information

Possibilistic information fusion using maximal coherent subsets

Possibilistic information fusion using maximal coherent subsets Possibilistic information fusion using maximal coherent subsets Sebastien Destercke and Didier Dubois and Eric Chojnacki Abstract When multiple sources provide information about the same unknown quantity,

More information

Should all Machine Learning be Bayesian? Should all Bayesian models be non-parametric?

Should all Machine Learning be Bayesian? Should all Bayesian models be non-parametric? Should all Machine Learning be Bayesian? Should all Bayesian models be non-parametric? Zoubin Ghahramani Department of Engineering University of Cambridge, UK zoubin@eng.cam.ac.uk http://learning.eng.cam.ac.uk/zoubin/

More information

A Fuzzy-Cautious OWA Approach with Evidential Reasoning

A Fuzzy-Cautious OWA Approach with Evidential Reasoning Advances and Applications of DSmT for Information Fusion Collected Works Volume 4 A Fuzzy-Cautious OWA Approach with Evidential Reasoning Deqiang Han Jean Dezert Jean-Marc Tacnet Chongzhao Han Originally

More information

arxiv:math/ v1 [math.gm] 20 Apr 2004

arxiv:math/ v1 [math.gm] 20 Apr 2004 Infinite classes of counter-examples to the Dempster s rule of combination arxiv:math/0404371v1 [math.gm] 20 Apr 2004 Jean Dezert ONERA, Dtim/ied 29 Av. de la Division Leclerc 92320 Châtillon, France.

More information

Unification of Fusion Theories (UFT)

Unification of Fusion Theories (UFT) International Journal of Applied Mathematics & Statistics (IJAMS), Dec. 1-14 Copyright 2004 IJAMS, CESER Unification of Fusion Theories (UFT) Florentin Smarandache Department of Mathematics and Sciences

More information

A class of fusion rules based on the belief redistribution to subsets or complements

A class of fusion rules based on the belief redistribution to subsets or complements Chapter 5 A class of fusion rules based on the belief redistribution to subsets or complements Florentin Smarandache Chair of Math. & Sciences Dept., Univ. of New Mexico, 200 College Road, Gallup, NM 87301,

More information

Bayesian Reasoning. Adapted from slides by Tim Finin and Marie desjardins.

Bayesian Reasoning. Adapted from slides by Tim Finin and Marie desjardins. Bayesian Reasoning Adapted from slides by Tim Finin and Marie desjardins. 1 Outline Probability theory Bayesian inference From the joint distribution Using independence/factoring From sources of evidence

More information

INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR. NPTEL National Programme on Technology Enhanced Learning. Probability Methods in Civil Engineering

INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR. NPTEL National Programme on Technology Enhanced Learning. Probability Methods in Civil Engineering INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR NPTEL National Programme on Technology Enhanced Learning Probability Methods in Civil Engineering Prof. Rajib Maity Department of Civil Engineering IIT Kharagpur

More information

SAMPLE CHAPTERS UNESCO EOLSS FOUNDATIONS OF STATISTICS. Reinhard Viertl Vienna University of Technology, A-1040 Wien, Austria

SAMPLE CHAPTERS UNESCO EOLSS FOUNDATIONS OF STATISTICS. Reinhard Viertl Vienna University of Technology, A-1040 Wien, Austria FOUNDATIONS OF STATISTICS Reinhard Viertl Vienna University of Technology, A-1040 Wien, Austria Keywords: a-priori distribution, a-priori information, Bayes risk, Bayes strategy, conditional probability,

More information

Symmetric Probability Theory

Symmetric Probability Theory Symmetric Probability Theory Kurt Weichselberger, Munich I. The Project p. 2 II. The Theory of Interval Probability p. 4 III. The Logical Concept of Probability p. 6 IV. Inference p. 11 Kurt.Weichselberger@stat.uni-muenchen.de

More information

A novel k-nn approach for data with uncertain attribute values

A novel k-nn approach for data with uncertain attribute values A novel -NN approach for data with uncertain attribute values Asma Trabelsi 1,2, Zied Elouedi 1, and Eric Lefevre 2 1 Université de Tunis, Institut Supérieur de Gestion de Tunis, LARODEC, Tunisia trabelsyasma@gmail.com,zied.elouedi@gmx.fr

More information

2. Probability. Chris Piech and Mehran Sahami. Oct 2017

2. Probability. Chris Piech and Mehran Sahami. Oct 2017 2. Probability Chris Piech and Mehran Sahami Oct 2017 1 Introduction It is that time in the quarter (it is still week one) when we get to talk about probability. Again we are going to build up from first

More information

Uncertainty Sources, Types and Quantification Models for Risk Studies

Uncertainty Sources, Types and Quantification Models for Risk Studies Uncertainty Sources, Types and Quantification Models for Risk Studies Bilal M. Ayyub, PhD, PE Professor and Director Center for Technology and Systems Management University of Maryland, College Park Workshop

More information

A Real Z-box Experiment for Testing Zadeh s Example

A Real Z-box Experiment for Testing Zadeh s Example 18th International Conference on Information Fusion Washington, DC - July 6-9, 2015 A Real Z-box Experiment for Testing Zadeh s Example Jean Dezert The French Aerospace Lab Chemin de la Hunière F-91761

More information

3. DIFFERENT MODEL TYPES

3. DIFFERENT MODEL TYPES 3-1 3. DIFFERENT MODEL TYPES It is important for us to fully understand a physical problem before we can select a solution strategy for it. Models are convenient tools that enhance our understanding and

More information

BIVARIATE P-BOXES AND MAXITIVE FUNCTIONS. Keywords: Uni- and bivariate p-boxes, maxitive functions, focal sets, comonotonicity,

BIVARIATE P-BOXES AND MAXITIVE FUNCTIONS. Keywords: Uni- and bivariate p-boxes, maxitive functions, focal sets, comonotonicity, BIVARIATE P-BOXES AND MAXITIVE FUNCTIONS IGNACIO MONTES AND ENRIQUE MIRANDA Abstract. We give necessary and sufficient conditions for a maxitive function to be the upper probability of a bivariate p-box,

More information

Object identification using T-conorm/norm fusion rule

Object identification using T-conorm/norm fusion rule Albena Tchamova, Jean Dezert, Florentin Smarandache Object identification using T-conorm/norm fusion rule Albena Tchamova 1 IPP, Bulgarian Academy of Sciences, Acad. G. Bonchev Str., bl. 25-A, 1113 Sofia,

More information

Measure divergence degree of basic probability assignment based on Deng relative entropy

Measure divergence degree of basic probability assignment based on Deng relative entropy Measure divergence degree of basic probability assignment based on Deng relative entropy Liguo Fei a, Yong Deng a,b,c, a School of Computer and Information Science, Southwest University, Chongqing, 400715,

More information

Application of Evidence Theory to Construction Projects

Application of Evidence Theory to Construction Projects Application of Evidence Theory to Construction Projects Desmond Adair, University of Tasmania, Australia Martin Jaeger, University of Tasmania, Australia Abstract: Crucial decisions are necessary throughout

More information

Joint Tracking and Classification of Airbourne Objects using Particle Filters and the Continuous Transferable Belief Model

Joint Tracking and Classification of Airbourne Objects using Particle Filters and the Continuous Transferable Belief Model Joint Tracking and Classification of Airbourne Objects using Particle Filters and the Continuous Transferable Belief Model Gavin Powell & David Marshall The Geometric Computing & Computer Vision Group,

More information